{"id":53331,"date":"2025-04-25T09:03:09","date_gmt":"2025-04-25T13:03:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53331"},"modified":"2025-04-25T09:03:09","modified_gmt":"2025-04-25T13:03:09","slug":"trojan-in-fake-smartphones","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/trojan-in-fake-smartphones\/53331\/","title":{"rendered":"Trojan embedded in fake Android smartphones"},"content":{"rendered":"<p>The familiar checkout ritual at the supermarket: once everything\u2019s been scanned \u2014 the offer, delivered with a hopeful smile: \u201cChocolate bar for the road? It\u2019s a good one, and the discount is almost criminal\u201d. If you\u2019re lucky, you get a delicious bonus at a great price. But more often than not they\u2019re trying to sell you something that\u2019s not selling well: either it\u2019s about to expire or it has some other hidden flaw.<\/p>\n<p>Now, imagine you declined that chocolate bar, but it was secretly slipped into your bag anyway, or even worse, into your pocket, where it melted and ruined your clothes, spoiling your day. Well, something similar happened to those who bought knock-offs of popular smartphone brands from online marketplaces. No, they didn\u2019t get a chocolate bar. They walked away with a brand-new smartphone that had the Triada Trojan embedded in its firmware. This is much worse than melted chocolate. Their crypto balances, along with their Telegram, WhatsApp, and social media accounts, could be gone before they could utter \u201cbargain!\u201d. Someone could steal their text messages and a lot more.<\/p>\n<h2>Triada? What Triada?<\/h2>\n<p>That\u2019s the name we at Kaspersky gave to the Trojan we first discovered and <a href=\"https:\/\/www.kaspersky.com\/blog\/triada-trojan\/11481\/\" target=\"_blank\" rel=\"noopener nofollow\">described in detail<\/a> in 2016. This mobile malware would infiltrate almost every process running on a device, while residing only in the RAM.<\/p>\n<p>The emergence of Triada spelled a new era in the evolution of mobile threats targeting Android. Before Triada, Trojans were relatively harmless \u2014 mainly displaying ads and downloading other Trojans. This new threat showed that things would never be the same again.<\/p>\n<p>With time, Android developers fixed the vulnerabilities that early versions of Triada exploited. Recent Android versions restricted even users with root privileges from editing system partitions. Did this stop the cybercriminals? What do you think?!..<\/p>\n<p>Fast-forward to March 2025, and we discovered an adapted version of Triada that takes advantage of the new restrictions. The threat actor infects the firmware even before the smartphones are sold. Pre-installed in system partitions, the malware proves nearly impossible to remove.<\/p>\n<h2>What is this new version capable of?<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Our Android security solution<\/a> detects the new version of Triada as <strong>Backdoor.AndroidOS.Triada.z<\/strong>. This new version is what\u2019s embedded in the firmware of fake Android smartphones available from online marketplaces. It can attack <em>any<\/em> application running on the device. This gives the Trojan virtually unlimited capabilities. It can control text messages and calls, steal crypto, download and run other applications, replace links in browsers, surreptitiously send messages in chat apps on your behalf, and hijack social media accounts.<\/p>\n<p>A copy of Triada infiltrates every app launched on an infected device. Besides that, the Trojan includes specialized modules that target popular apps. As soon as the user downloads a legitimate app like Telegram or TikTok, the Trojan embeds itself in it and starts causing harm.<\/p>\n<p><strong>Telegram. <\/strong>Triada downloads two modules to compromise Telegram. The first one initiates malicious activity once a day, connecting to a command-and-control (C2) server. It sends the victim\u2019s phone number to the criminals, along with complete authentication data \u2014 including the access token. The second module filters all messages, interacting with a bot (which didn\u2019t exist at the time of our research), and deleting notifications about new Telegram logins.<\/p>\n<p><strong>Instagram.<\/strong> Once a day, the Trojan runs a malicious task to search for active session cookies and forward the data to the attackers. These files help the criminals assume full control over the account.<\/p>\n<p><strong>Browsers. <\/strong>Triada threatens a number of browsers: Chrome, Opera, Mozilla, and some others. The full list is available <a href=\"https:\/\/securelist.com\/triada-trojan-modules-analysis\/116380\/\" target=\"_blank\" rel=\"noopener\">in the Securelist article<\/a>. The module connects to the C2 server over TCP and randomly redirects legitimate links in the browsers to advertising sites for now. However, because the Trojan downloads redirect links from its C2 server, attackers can direct users to phishing sites at any time.<\/p>\n<p><strong>WhatsApp.<\/strong> Again, there are two modules. The first one collects and sends data about the active session to the C2 server every five minutes \u2014 giving the attackers full access to the victim\u2019s account. The second one intercepts the client functions for sending and receiving messages, which allows the malware to send and then delete arbitrary instant messages to cover its tracks.<\/p>\n<p><strong>LINE.<\/strong> The dedicated Triada module collects internal app data, including authentication data (access token), every 30 seconds, and forwards it the C2 server. In this case, too, someone else assumes full control of the user\u2019s account.<\/p>\n<p><strong>Skype.<\/strong> Although Skype is about to be <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2025\/02\/28\/the-next-chapter-moving-from-skype-to-microsoft-teams\/\" target=\"_blank\" rel=\"nofollow noopener\">retired<\/a>, Triada still has a module for infecting it. Triada uses several methods to obtain the authentication token and then sends it to the C2 server.<\/p>\n<p><strong>TikTok. <\/strong>This module can collect a lot of data about the victim\u2019s account from cookie files in the internal directory, and also extract data required for communicating with the TikTok API.<\/p>\n<p><strong>Facebook. <\/strong>Triada is armed with two modules for this app. One of them steals authentication cookies, and the other sends information about the infected device to the C2 server.<\/p>\n<p>Of course, there are also <strong>modules for SMS and calls<\/strong>. The first <strong>SMS module<\/strong> allows the malware to filter all incoming messages and extract codes from them, respond to some messages\u00a0(likely to subscribe victims to paid services) and send arbitrary SMS messages when instructed by the C2 server. The second, auxiliary module disables the built-in Android protection against SMS Trojans that requests user permission before sending messages to short codes (Premium SMS), which could be used to confirm paid subscriptions.<\/p>\n<p>The <strong>call module<\/strong> embeds itself in the phone app, but it\u2019s most likely still under development. We discovered that it partially implements phone number spoofing \u2014 something we expect to be completed soon.<\/p>\n<p>Another module, a <strong>reverse proxy<\/strong>, turns the victim\u2019s smartphone into a reverse proxy server, giving attackers access to arbitrary IP addresses on behalf of the victim.<\/p>\n<p>Not unexpectedly, Triada also targets crypto owners, with a special surprise awaiting them: a <strong>clipper<\/strong>. The Trojan watches the clipboard for crypto wallet addresses, substituting one of the attackers\u2019 own. A <strong>crypto stealer<\/strong> analyzes the victim\u2019s activity, replacing crypto wallet addresses with a fraudulent addresses anywhere it can, whenever an attempt is made to withdraw cryptocurrency. It even interferes with button tap handlers inside apps and replaces images with generated QR codes that link to the attackers\u2019 wallet addresses. The criminals have managed to steal more than US$264\u00a0000 in various cryptocurrencies since June 13, 2024 with the help of these tools.<\/p>\n<p>See <a href=\"https:\/\/securelist.com\/triada-trojan-modules-analysis\/116380\/\" target=\"_blank\" rel=\"noopener\">our Securelist report<\/a> for a full list of Triada features and a detailed technical analysis.<\/p>\n<h2>How the malware infiltrates smartphones.<\/h2>\n<p>In every infection case that we are aware of, the firmware name on the device differed from the official one by a single letter. For example, the official firmware was <strong>TGPMIXM<\/strong>, while the infected phones had <strong>TGPMIXN<\/strong>. We found posts on relevant discussion boards where users complained about counterfeit devices purchased from online stores.<\/p>\n<p>It\u2019s likely that a stage in the supply chain was compromised, while the stores had no idea they were distributing devices infected with Triada. Meanwhile, it\u2019s practically impossible to determine exactly when the malware was placed inside the smartphones.<\/p>\n<h2>How to protect yourself from Triada<\/h2>\n<p>The new version of the Trojan was found pre-installed on counterfeit devices. Therefore, the best way to avoid Triada infection is to buy smartphones from authorized dealers only. If you suspect that your phone may have been infected with Triada (or another Trojan), here are our recommendations.<\/p>\n<ul>\n<li>Refrain from using any of the potentially compromised apps listed above or making any financial transactions \u2014 including cryptocurrency.<\/li>\n<li>Install <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a>\u00a0on your smartphone to check if it\u2019s indeed infected.<\/li>\n<li>If Triada is found on the device, reflash the smartphone with the official firmware yourself, or contact the local service center. Expect sudden changes to your smartphone\u2019s specs: besides the pre-installed Trojan, the fake firmware often overstated the RAM and storage.<\/li>\n<li>If your smartphone is found to be infected with Triada, check all messaging and social media apps that may have been compromised. For chat apps, make sure you terminate any sessions still running on devices you don\u2019t recognize, and check your privacy settings according to our guide <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-prevent-whatsapp-telegram-account-hijacking-and-quishing\/53012\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>WhatsApp and Telegram account hijacking: How to protect yourself against scams<\/strong><\/a>. If you suspect that your instant messaging accounts have been hijacked, read <a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-account-hacked\/53069\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>What to do if your WhatsApp account gets hacked<\/strong><\/a> or <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-account-hacked\/52775\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>What to do if your Telegram account is hacked<\/strong><\/a>. Terminate all social media sessions on all your devices and change your passwords. <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>\u00a0can help you with that.<\/li>\n<li>Our <a href=\"https:\/\/privacy.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_kd-banner_ap0072&amp;utm_content=banner&amp;utm_term=gl_kdaily_organic_hwzuab72aq5ynvk\" target=\"_blank\" rel=\"noopener\">Privacy Checker<\/a>\u00a0portal offers a step-by-step guide on configuring privacy in various applications and operating systems in general.<\/li>\n<\/ul>\n<blockquote><p>Triada is far from the only mobile Trojan. Follow these links for our stories about other Android malware:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/necro-infects-android-users\/52201\/\" target=\"_blank\" rel=\"noopener nofollow\">How the Necro Trojan attacked 11 million Android users<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\">SparkCat trojan stealer infiltrates App Store and Google Play, steals data from photos<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tria-stealer-wedding-scam\/52958\/\" target=\"_blank\" rel=\"noopener nofollow\">Beware of stealers disguised as\u2026 wedding invitations<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/new-spy-for-android-smartphones-lianspy\/51923\/\" target=\"_blank\" rel=\"noopener nofollow\">LianSpy: new mobile spyware for Android<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.<\/p>\n","protected":false},"author":2739,"featured_media":53333,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,404,2640,20,765,607,43,211,611,1475,723,546],"class_list":{"0":"post-53331","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-cookies","10":"tag-cryptocurrencies","11":"tag-facebook","12":"tag-instagram","13":"tag-messengers","14":"tag-privacy","15":"tag-social-media","16":"tag-telegram","17":"tag-triada","18":"tag-trojans","19":"tag-whatsapp"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/trojan-in-fake-smartphones\/53331\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/trojan-in-fake-smartphones\/28778\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/trojan-in-fake-smartphones\/24012\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/trojan-in-fake-smartphones\/12383\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/trojan-in-fake-smartphones\/28891\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/trojan-in-fake-smartphones\/28073\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/trojan-in-fake-smartphones\/30910\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/trojan-in-fake-smartphones\/29611\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/trojan-in-fake-smartphones\/39418\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/trojan-in-fake-smartphones\/13304\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/trojan-in-fake-smartphones\/22745\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/trojan-in-fake-smartphones\/23675\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/trojan-in-fake-smartphones\/32106\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/trojan-in-fake-smartphones\/29055\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/trojan-in-fake-smartphones\/34835\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/trojan-in-fake-smartphones\/34467\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2739"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53331"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53331\/revisions"}],"predecessor-version":[{"id":53336,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53331\/revisions\/53336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53333"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}