Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

Triada Malware Hidden in Low Budget Android Devices

Triada Malware Hidden in Low Budget Android Devices Triada Malware Hidden in Low Budget Android Devices
IMAGE CREDITS: BIS

A new wave of counterfeit Android smartphones is raising alarms after cybersecurity researchers uncovered that these devices are shipping with pre-installed malware. The threat actor behind this scheme is Triada malware notorious remote access Trojan (RAT) known for its ability to steal sensitive user data and remain hidden inside system-level processes.

Triada has resurfaced in a far more insidious form. Quietly embedded within the firmware of fake Android phones that are being sold at attractive prices. These seemingly new devices are already compromised before they even reach the consumer. Exposing users to serious security risks without their knowledge.

Originally identified by Kaspersky Lab back in 2016, Triada first made headlines after being detected in apps available on the Google Play Store. At the time, it mainly targeted communication and banking applications to siphon off confidential information. But the malware has evolved. According to researchers at Darktrace, Triada’s current capabilities are even more advanced. Using algorithm-generated hostnames to discreetly transfer stolen data to command-and-control servers. This stealthy communication method makes it difficult for traditional security tools to catch the intrusion in real time.

In a new report, Darktrace cyber analyst Justin Torres emphasized how Triada’s sophisticated methods allow it to bypass detection while embedding itself deep into the Android operating system. This makes it nearly impossible to remove once it’s in the system, and dramatically increases the risk to users.

Kaspersky’s latest findings reveal that more than 2,600 users—mostly located in Russia. Have already been affected by this new variant of Triada. The Trojan is not just bundled with apps anymore; it’s embedded directly into the system framework, which means it becomes part of every process running on the smartphone.

What’s even more alarming is the suggestion that the malware is entering devices at the supply chain level. Dmitry Kalinin, a cybersecurity expert at Kaspersky Lab, explained that the infection likely occurs before the smartphones are even packaged for sale. This means unsuspecting stores may be selling compromised phones without realizing it.

“The Triada Trojan has long been considered one of the most dangerous Android threats. This latest version takes it to another level by being installed directly in the firmware,” Kalinin warned.

The Trojan opens the door to a wide range of malicious activities. Once active, it allows attackers to hijack social media and messaging accounts, send unauthorized messages, steal cryptocurrency, monitor user behavior. And even download and execute other programs remotely. In short, users lose control over their devices, and may not even realize it until the damage is done.

With the rise of low-cost counterfeit phones and increasingly sophisticated malware like Triada, cybersecurity experts are urging consumers to buy only from reputable sources and to be cautious of deals that seem too good to be true. Advanced threat detection tools and supply chain security audits are now more crucial than ever in protecting users against these invisible, high-risk threats.

Share with others