Shocking Cyber Scam: 2,600+ Fake Phones Sold with Crypto-Stealing Malware

Hackers have found a new way to steal money. They are selling counterfeit smartphones loaded with hidden malware that can drain people’s cryptocurrency wallets. These fake Android devices, available at discounted prices online, come with a secret built-in virus known as the Triada Trojan.

Fake Phones Sold Online Are Stealing People’s Crypto

Cybersecurity experts from Kaspersky Labs recently discovered that over 2,600 people in different countries have already fallen victim to this scam. Most of the cases have been reported in Russia, and experts believe the number of infected devices could be even higher. Once someone buys and starts using one of these infected phones, hackers can gain almost complete control over the device, stealing sensitive data, including crypto funds.

The Triada Trojan is an advanced type of malware that has been around since 2016. It is designed to hide deep inside a device’s system, making it extremely difficult to detect and remove. The worst part? It infects the phone even before it reaches the buyer, meaning the user doesn’t even have to download anything for their device to be compromised.

How the Malware Works and Why It’s Dangerous

Once the victim starts using the infected phone, the hackers can steal their cryptocurrency in a sneaky way. When the user tries to send money to someone, the malware secretly changes the wallet address. Instead of going to the intended recipient, the funds are sent directly to the hackers.

So far, experts have tracked about $270,000 in stolen cryptocurrency, but the actual number could be much higher. Some of the stolen funds include Monero, a type of digital currency known for being untraceable. This makes it even harder for victims to recover their stolen money.

The malware does more than steal money. It can take user account details also can read and send messages. It can even intercept two-factor authentication codes. This allows hackers to break into accounts without the victim knowing.

Cyberattack Catastrophe: How Hackers Can Endanger Human Lives ?

Where Are These Infected Phones Coming From?

It is still unclear exactly where these compromised phones are being made, but researchers believe hackers have found a way to insert malware into the devices at some point in the supply chain. This means that even the online stores selling these phones might not know they are part of a dangerous scam.

Security experts are warning people to be extremely careful when buying smartphones online. If a deal seems too good to be true, it probably is.  Also, experts recommend installing security software on any new device to check for potential threats.

This shocking scam proves that hackers are constantly finding new ways to trick people and steal their money. As cryptocurrency becomes more popular, cybercriminals are coming up with more advanced ways to take advantage of unsuspecting users.

The best defense against such attacks is awareness. People should always double-check the source of their devices and be cautious when dealing with anything related to online security. Unfortunately, for those who have already been scammed, recovering stolen cryptocurrency is almost impossible, making it all the more important to stay vigilant.

Critical Vulnerabilities: The Dark Side of Pacemaker Technology

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

26-year-old Yorkshire hacker sentenced for cyberattacks on global organisations and data theft

Yorkshire man sentenced for targeting governments A court jailed a...

Outrage in Brazil: Government Demands Meta Remove Chatbots That ‘Eroticize’ Children

Brazil Takes Action Against Harmful AI Chatbots The Brazilian government...

Semiconductor sector faces billion-dollar cyber losses driven by AI-enabled threats

The world’s most powerful technology, semiconductors, is now caught...

🚨 Data Breach Shock: TPG Telecom Confirms Cyber Incident in iiNet System

Australia’s second-largest internet provider, TPG Telecom, has confirmed it...

Marvel Studio’s Sudden Exit Leaves Georgia’s Film Industry Struggling

For more than a decade, Georgia was known as...

Monero a privacy coin faces 51% attack as mining pool gains control of network power

The crypto world is in shock after Monero, one...

Norwegian dam targeted in cyber sabotage, 2 million gallons of water released

Cyberattack triggers massive water release Norway had linked a cyberattack...

Sree Padmanabhaswamy temple network hacked, police register cyber case

Temple Computer Systems Breached A major security scare has shaken...

26-year-old Yorkshire hacker sentenced for cyberattacks on global organisations and data theft

Yorkshire man sentenced for targeting governments A court jailed a...

Outrage in Brazil: Government Demands Meta Remove Chatbots That ‘Eroticize’ Children

Brazil Takes Action Against Harmful AI Chatbots The Brazilian government...

Semiconductor sector faces billion-dollar cyber losses driven by AI-enabled threats

The world’s most powerful technology, semiconductors, is now caught...

🚨 Data Breach Shock: TPG Telecom Confirms Cyber Incident in iiNet System

Australia’s second-largest internet provider, TPG Telecom, has confirmed it...

Norwegian dam targeted in cyber sabotage, 2 million gallons of water released

Cyberattack triggers massive water release Norway had linked a cyberattack...

Related Articles

Popular Categories

error: Content is protected !!