Newsinterpretation

Shocking Cyber Scam: 2,600+ Fake Phones Sold with Crypto-Stealing Malware

Hackers have found a new way to steal money. They are selling counterfeit smartphones loaded with hidden malware that can drain people’s cryptocurrency wallets. These fake Android devices, available at discounted prices online, come with a secret built-in virus known as the Triada Trojan.

Fake Phones Sold Online Are Stealing People’s Crypto

Cybersecurity experts from Kaspersky Labs recently discovered that over 2,600 people in different countries have already fallen victim to this scam. Most of the cases have been reported in Russia, and experts believe the number of infected devices could be even higher. Once someone buys and starts using one of these infected phones, hackers can gain almost complete control over the device, stealing sensitive data, including crypto funds.

The Triada Trojan is an advanced type of malware that has been around since 2016. It is designed to hide deep inside a device’s system, making it extremely difficult to detect and remove. The worst part? It infects the phone even before it reaches the buyer, meaning the user doesn’t even have to download anything for their device to be compromised.

How the Malware Works and Why It’s Dangerous

Once the victim starts using the infected phone, the hackers can steal their cryptocurrency in a sneaky way. When the user tries to send money to someone, the malware secretly changes the wallet address. Instead of going to the intended recipient, the funds are sent directly to the hackers.

So far, experts have tracked about $270,000 in stolen cryptocurrency, but the actual number could be much higher. Some of the stolen funds include Monero, a type of digital currency known for being untraceable. This makes it even harder for victims to recover their stolen money.

The malware does more than steal money. It can take user account details also can read and send messages. It can even intercept two-factor authentication codes. This allows hackers to break into accounts without the victim knowing.

Cyberattack Catastrophe: How Hackers Can Endanger Human Lives ?

Where Are These Infected Phones Coming From?

It is still unclear exactly where these compromised phones are being made, but researchers believe hackers have found a way to insert malware into the devices at some point in the supply chain. This means that even the online stores selling these phones might not know they are part of a dangerous scam.

Security experts are warning people to be extremely careful when buying smartphones online. If a deal seems too good to be true, it probably is.  Also, experts recommend installing security software on any new device to check for potential threats.

This shocking scam proves that hackers are constantly finding new ways to trick people and steal their money. As cryptocurrency becomes more popular, cybercriminals are coming up with more advanced ways to take advantage of unsuspecting users.

The best defense against such attacks is awareness. People should always double-check the source of their devices and be cautious when dealing with anything related to online security. Unfortunately, for those who have already been scammed, recovering stolen cryptocurrency is almost impossible, making it all the more important to stay vigilant.

Critical Vulnerabilities: The Dark Side of Pacemaker Technology

Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

CBS News erupts after last-minute decision halts cleared 60 Minutes investigation

A serious internal conflict has erupted inside CBS News...

Selfies at a death scene: Turning Point USA recreates tent of Charlie Kirk’s killing for conference photos

Turning Point USA (TPUSA) has sparked widespread controversy after...

Redacted Epstein files appear ‘restored’ as hidden text resurfaces in Justice Department release

Documents released by the United States Department of Justice...

Remote jobs exploited in global scheme as Amazon halts 1,800 North Korea-linked applications

Amazon has recently blocked more than 1,800 job applications...

Romania hit by ransomware attack as 1,000 government computers taken offline in water authority breach

Romania’s water management authority has been hit by a...

“Democracy under siege”: Sanders warns Meta and Big Tech are buying U.S. elections to block AI rules

U.S. Senator Bernie Sanders has issued a strong warning...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...

House committee releases photos from Jeffrey Epstein estate with candid and unsettling content

New photos have emerged from the estate of Jeffrey...

Kamala Harris responds to criticism over Biden’s handling of Epstein-related documents

The controversy surrounding documents linked to disgraced sex trafficker...

CBS News erupts after last-minute decision halts cleared 60 Minutes investigation

A serious internal conflict has erupted inside CBS News...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...
error: Content is protected !!
Exit mobile version