Hackers have found a new way to steal money. They are selling counterfeit smartphones loaded with hidden malware that can drain people’s cryptocurrency wallets. These fake Android devices, available at discounted prices online, come with a secret built-in virus known as the Triada Trojan.
Fake Phones Sold Online Are Stealing People’s Crypto
Cybersecurity experts from Kaspersky Labs recently discovered that over 2,600 people in different countries have already fallen victim to this scam. Most of the cases have been reported in Russia, and experts believe the number of infected devices could be even higher. Once someone buys and starts using one of these infected phones, hackers can gain almost complete control over the device, stealing sensitive data, including crypto funds.
The Triada Trojan is an advanced type of malware that has been around since 2016. It is designed to hide deep inside a device’s system, making it extremely difficult to detect and remove. The worst part? It infects the phone even before it reaches the buyer, meaning the user doesn’t even have to download anything for their device to be compromised.
How the Malware Works and Why It’s Dangerous
Once the victim starts using the infected phone, the hackers can steal their cryptocurrency in a sneaky way. When the user tries to send money to someone, the malware secretly changes the wallet address. Instead of going to the intended recipient, the funds are sent directly to the hackers.
So far, experts have tracked about $270,000 in stolen cryptocurrency, but the actual number could be much higher. Some of the stolen funds include Monero, a type of digital currency known for being untraceable. This makes it even harder for victims to recover their stolen money.
The malware does more than steal money. It can take user account details also can read and send messages. It can even intercept two-factor authentication codes. This allows hackers to break into accounts without the victim knowing.
Cyberattack Catastrophe: How Hackers Can Endanger Human Lives ?
Where Are These Infected Phones Coming From?
It is still unclear exactly where these compromised phones are being made, but researchers believe hackers have found a way to insert malware into the devices at some point in the supply chain. This means that even the online stores selling these phones might not know they are part of a dangerous scam.
Security experts are warning people to be extremely careful when buying smartphones online. If a deal seems too good to be true, it probably is. Also, experts recommend installing security software on any new device to check for potential threats.
This shocking scam proves that hackers are constantly finding new ways to trick people and steal their money. As cryptocurrency becomes more popular, cybercriminals are coming up with more advanced ways to take advantage of unsuspecting users.
The best defense against such attacks is awareness. People should always double-check the source of their devices and be cautious when dealing with anything related to online security. Unfortunately, for those who have already been scammed, recovering stolen cryptocurrency is almost impossible, making it all the more important to stay vigilant.
Critical Vulnerabilities: The Dark Side of Pacemaker Technology