AGL56.75▼ -1 (-0.02%)AIRLINK167.28▼ -1.23 (-0.01%)BOP9.74▼ -0.05 (-0.01%)CNERGY7.91▼ -0.08 (-0.01%)DCL9.65▼ -0.24 (-0.02%)DFML38.95▼ -1.21 (-0.03%)DGKC122.57▼ -0.05 (0.00%)FCCL43.63▼ -0.3 (-0.01%)FFL15.43▼ -0.09 (-0.01%)HUBC137.5▼ -0.47 (0.00%)HUMNL12.5▲ 0.13 (0.01%)KEL4.22▼ -0.02 (0.00%)KOSM5.59▲ 0.03 (0.01%)MLCF64.74▼ -0.05 (0.00%)NBP84.35▲ 1.05 (0.01%)OGDC209.99▼ -1.7 (-0.01%)PAEL44.9▼ -0.12 (0.00%)PIBTL9.28▲ 0.05 (0.01%)PPL165.3▼ -1.1 (-0.01%)PRL30.35▼ -0.3 (-0.01%)PTC21.09▼ -0.11 (-0.01%)SEARL89.99▼ -0.48 (-0.01%)TELE7.28▼ -0.11 (-0.01%)TOMCL34.82▲ 0.09 (0.00%)TPLP9.16▼ -0.21 (-0.02%)TREET20.41▲ 0.54 (0.03%)TRG65.5▲ 0.5 (0.01%)UNITY26.27▼ -0.23 (-0.01%)WTL1.31▲ 0 (0.00%)

Counterfeit smartphones at risk of sophisticated cyberattacks

Auto Draft
Share
Tweet
WhatsApp
Share on Linkedin
[tta_listen_btn]

ISLAMABAD – Counterfeit smartphones are vulnerable to cyberattacks due to a pre-installed, sophisticated version of the Triada Trojan.

According to Kaspersky, more than 2,600 users worldwide have been affected. Embedded in the system firmware, the malware operates undetected, granting attackers full control over infected devices.

Unlike typical mobile malware delivered via malicious apps, this variant is integrated into the system framework, infiltrating every running process.

It enables a wide range of malicious activity, including stealing messaging and social media accounts, including Telegram, TikTok, Facebook, and Instagram, sending and deleting messages in apps like WhatsApp and Telegram, substituting cryptocurrency wallet addresses, redirecting phone calls by spoofing caller IDs, monitoring browser activity and injecting links, intercepting, sending, and deleting SMS messages, enabling premium SMS charges, downloading and executing additional payloads and blocking network connections to potentially bypass anti-fraud systems.

Triada Trojan has become the most advanced threat in the Android ecosystem, said Dmitry Kalinin, malware analyst at Kaspersky Threat Research.

He said that the new version infiltrates the device at the firmware level before it even reaches the user. Attackers have already funnelled at least $270,000 in stolen cryptocurrency to their wallets, though the actual total may be higher due to the use of untraceable coins like Monero.”

First discovered in 2016, Triada has continually evolved, leveraging system-level privileges to execute fraud, hijack SMS authentication, and evade detection. This latest campaign marks a concerning escalation, as attackers potentially exploit supply chain flaws to deploy firmware-level malware on counterfeit devices.

Related Posts

Get Alerts