Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Triad malicious software pre -loaded on fake Android phones, infects 2600+ devices
Global Security

Triad malicious software pre -loaded on fake Android phones, infects 2600+ devices

AdminBy AdminApril 3, 2025No Comments4 Mins Read
Malware Preloaded on Android
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


03 April 2025Red LakshmananIntelligence threats / mobile security

Malicious software pre -loaded on Android

It has been found that fake versions of popular smartphone models sold at reduced prices Triad.

“More than 2,600 users in different countries have encountered a new version of Triada, most in Russia,” Kaspersky – Note In the report. The infections were recorded between March 13 and 27, 2025.

Triada – This is the name given to the Android modular family that was that was For the first time discovered In the Russian cybersecurity campaign in March 2016. Trojan remote access (rat), it is equipped for theft of a wide range of secret information, as well as engaged devices in botnet for other malicious activities.

While the malicious software was previously observed, spread through intermediate apps published in the Google Play Store (and elsewhere) that it is Obtained root access On compromised phones the following companies used WhatsApp fashions like Fmwhatsapp and Yowhatsapp as a vector of distribution.

Cybersecurity

Over the years, changed versions of Triada have also found their way into android pills, television boxes and digital projectors as part of a widespread Scheme of fraud called Badbox This uses compromises of the supply network and other markets for initial access.

This behavior was For the first time observed In 2017, when malicious software turned into a pre -installed back frame of Android, which allowed the subjects the threat to remotely control the devices, introduce more malware and use them for various illegal activities.

“Triada infects the images of the device system through the third party during the production process,” Google noted In June 2019, “Sometimes OEM wants to include features that are not included in an open source Android project, such as FACE Unlock. OEM can collaborate with third parties who can develop the right feature and send the whole image of the system for development.”

At this time, the technological giant is also a fingers on the supplier, which went by the name of Ehuo or Blazefir, since the party is probably responsible for the infection returned systemic image with a triad.

The latest samples of malicious programs, analyzed by the Casper, show that they are on a systematic basis, allowing it to copy to each process on a smartphone and giving attackers unobstructed and control to perform various activities –

  • Steal users’ accounts related to instant messengers and social networks such as Telegram and Tiktok
  • Sardino send WhatsApp messages and Telegram to other contacts on behalf of the victim and delete them to remove traces
  • Speech as a clip by grabbing the clipboard with the cryptocurrency wallet addresses to replace their wallet under their control
  • Keep track of the web browser’s activity and replace the links
  • Replace the phone numbers during calls
  • Intercourse SMS -messages and subscribe to the victims at the premium SMS
  • Download other programs
  • Block network connections to interfere with the normal functioning of the fraud

It is worth noting that Triada is not the only malicious software that is pre -loaded on the Android device at the stages of production. In May 2018 Avast disclosed What several hundred android models, including ZTE and Archos similar, were sent pre -installed by another advertising software called Cosiloon.

“Triad Trojan has been known for a long time, and he still remains one of the most difficult and dangerous threats for Android,” said Dmitry Kalinin researcher, Kaspersky. “Probably, at one stages, the supply chain is broken, so shops may not even suspect that they sell smartphones with Triada.”

Cybersecurity

“At the same time, the authors of the new version of Triada actively monetize their efforts. Judging by the analysis of transactions, they were able to transfer about $ 270,000 into different cryptocurrencies into their cryptocurrencies (between June 13, 2024 to March 27, 2025).”

The appearance of the updated version of Triada follows Crocodile and ChurchThe latter is aimed at 750 banking, financial and cryptocurrency applications.

Both families are distributed through dropper applications providing Google’s legal services. They also abuse Android accessibility services to remotely control infected devices, as well as conduct overhead attacks on Siphon Banking and credit card data.

The disclosure of information also happens like any. Theft of El Salvador What is masked as a bank application served by Indian users (the package name: “com.indusvalley.appinstall“) and is able to prepare sensitive user information.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.