Crypto Wallets Under Attack: Malware Hijacks Transactions on Infected Phones

Advertise With Us – Reach the Crypto Crowd

Promote your blockchain project, token, or service to a dedicated and growing crypto audience.

The excitement surrounding cryptocurrency has not only excited investors but also attracted digital robbery as a unique branch of work. A recent report from Kaspersky cybersecurity solutions has revealed malware infection risks that are even scarier: theft-friendly substandard smartphones available in bulk with viruses installed.

The Threat: Malware-Infected Phones Target Crypto Users

Kaspersky‘s report describes a threat from the new and evolved scope of targeting Android users. Troia of Triada has been deep-seated in the frameworks of fake cell phones and drowned in them. Diligent actions can lead to autonomous funding pulls on the user’s account. These merciless actions can be aimed at people without their understanding.

Evolving Risks: Challenges with Android Users

Triada is not a new threat. It has been around since 2016 and is one of the most complex and dangerous malware families attached to Android phones. Gaining root access on an infected unit opens ports for injection into mischievous codes and critical system processes like controlling apps launched on the Android market. The deep pathway-based addiction makes breaking through counter-petty barriers.

Compromised Supply Chains: A Hidden Danger

Kaspersky’s findings suggest a disturbing possibility: that malware is implanted in the phones somewhere along the supply chain, perhaps even before the devices are delivered to customers. “Most likely at one of the levels over the supply chain, it gets compromised, and thus even stores cannot have an idea that they are retailing smartphones that have Triada in them,” stated Dmitry Kalinin, a cybersecurity expert at Kaspersky Lab. Which implies that even purchasing the phone from a renowned store does not guarantee that the phone is secure.

Widespread Impact: Thousands of Users Affected

Per the Kaspersky report, between March 13 and March 27, 2025, more than 2600 users came across the Triada trojan. This is definitely an underestimation, to say the least, because the number of infections is far greater due to the malware’s cunning design, which makes it difficult to scope. The malware gives the Triada hackers ‘virtually unrestricted dominion’ over crippled smartphones, which empowers them to perform a myriad of reprehensible tasks.

Stealing Credentials and Hijacking Transactions: Triada’s Arsenal

Triada‘s capabilities extend beyond the theft of cryptocurrencies. Granting access to further mercenary acts such as

The theft of user credentials from Telegram and TikTok enables the user to compose communication messages for their targets without their authority and steal their identity.

Change the addresses of cryptocurrency wallets and covertly reroute the transactions to wallets under the control of an attacker. This is a particularly critical risk, due to users often not understanding that funds will be redirected to a different destination.

Seize the victim’s communication to send messages on their behalf, which will allow for the propagation of malware and the conduct of social engineering schemes.

A Multi-Stage Stealth and Persistent Attack

ReversingLabs Scientists performed a deep technical analysis on the malware, where they revealed that it was designed for a multistage stealth and persistent attack.

  • Infection Trigger: This occurs when a user downloads bad npm software, specifically the pdf-to-office. These packages often appear legitimate, concealing malicious code.
  • Scope: The parasite picks wallet applications on the infected device.
  • Scope: The parasite targets ASAR packs of Electron applications. The parasite then decompresses ZAM files containing programmes with malicious code.
  • Scope: The parasite retrieves specific JS system folders of wallet programmes, usually vendor folders.
  • Scope: It gets encoded to Base64, where disguised recipient wallet addresses get swapped to ones controlled by the attacker. The malware alters code, asking for control of the transaction.

Communication with Command-and-Control Server: Upon successfully infecting the device, the malware sends a message to the command-and-control server, relaying details such as the user’s home directory path alongside other pertinent status messages. This infection tracking enables attackers to monitor infections in real time while gaining further insights regarding the compromised systems.

A Growing Threat: The Need for Enhanced Security

The recurrence of the Triada trojan, along with the birth of other mobile malware like Crocodilus, illustrates the growing concern of sophisticated mobile malware targeted at cryptocurrency users. This highlights the necessity for safeguarding measures, not just from device manufacturers and app developers, but also individual users themselves, in order to avert financial and privacy losses in this modern world.

IMPORTANT NOTICE

This article is sponsored content. Kryptonary does not verify or endorse the claims, statistics, or information provided. Cryptocurrency investments are speculative and highly risky; you should be prepared to lose all invested capital. Kryptonary does not perform due diligence on featured projects and disclaims all liability for any investment decisions made based on this content. Readers are strongly advised to conduct their own independent research and understand the inherent risks of cryptocurrency investments.

Share this article

Subscribe

By pressing the Subscribe button, you confirm that you have read our Privacy Policy.