Close Menu
  • Identity
  • Startups
  • Tech
  • Spanish
What's Hot

AI Startup Snowcap raises $23 million in funding to build a superconducting chip that could surpass Nvidia

DHS warns Proilan hackers who are likely to target US networks after Iran’s nuclear attack

Senators urge FTC to investigate Spotify’s higher priced bundled subscriptions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Identity
  • Startups
  • Tech
  • Spanish
Fyself News
Home » Fake WhatsApp, Chinese Android phones shipped with Telegram app targeting Crypto users
Identity

Fake WhatsApp, Chinese Android phones shipped with Telegram app targeting Crypto users

userBy userApril 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cheap Android smartphones manufactured by Chinese companies have been observed to be pre-installed since June 2024 with Troyjanized apps disguised as WhatsApp and Telegram, which include cryptocurrency clipper features as part of the campaign.

While stealing financial information using malware-covered apps is not a new phenomenon, new discoveries from the Russian anti-virus vendor doctor webpoint are new discoveries into important escalations targeting threat actors to directly target supply chains of various Chinese manufacturers and preload new malicious devices.

“The fraudulent applications were detected directly with pre-installed software over the phone,” the company said. “In this case, malicious code has been added to WhatsApp messenger.”

Cybersecurity

The majority of compromised devices are named as the S23 Ultra, S24 Ultra, Note 13 Pro, and P70 Ultra, and are said to be low-end mobile phones that mimic the famous premium models of Samsung and Huawei. At least four affected models are manufactured under the Showji brand.

The attacker is said to have used the application to spoof the technical specifications displayed on the About Device page, as well as hardware and software information utilities such as AIDA64 and CPU-Z, which will give users the false impression that the phone is running Android 14 and the hardware has been improved.

Malicious Android apps are created using an open source project called LSPATCH. This project can inject Trojan called Shibai into otherwise legal software. In total, it is estimated that around 40 different applications, such as messengers and QR code scanners, have been modified in this way.

In an artifact analyzed by Doctor Web, the application hijacks the app’s update process to retrieve an APK file from the server under attacker’s control, searching for a string in a chat conversation that matches the cryptocurrency wallet address address pattern associated with Ethereum or Tron. If found, they will be replaced with the enemy’s address to the enemy’s speech.

“In the case of outgoing messages, the compromised device will display the correct address of the victim’s own wallet, and the recipient of the message will display the address of the fraudster’s wallet,” Doctor Web said.

“And when an incoming message is received, the sender checks the address of his wallet. Meanwhile, on the victim’s device, the incoming address is replaced by the address of the hacker’s wallet.”

In addition to changing the wallet address, the malware also features the ability to collect device information from DCIM, photos, alarms, downloads, documents, and screenshot folders, all WhatsApp messages, .jpg, .png, and .jpeg images on the attacker’s server.

The intention behind this step is to scan images saved for wallet recovery (aka mnemonic) phrases, allowing threat actors to gain unauthorized access to the victim’s wallet and to discharge their assets.

It is known that attackers leverage around 30 domains to distribute malicious applications and use over 60 command and control (C2) servers to manage operations, but it is not clear who is behind the campaign.

Cybersecurity

Further analysis of almost 20 cryptocurrency wallets used by threat actors reveals that they have received more than $1.6 million over the past two years, indicating that supply chain compromises have been paid off on a massive scale.

This development is because Swiss cybersecurity company Prodaft discovered a new family of Android malware called Gorilla, designed to collect sensitive information (device model, phone number, Android version, SIM card details, installed apps), discovered the main permanent access to infected devices, and received commands from remote servers.

“It is written in Kotlin and focuses primarily on SMS interception and persistent communication with its command and control (C2) server,” the company said in its analysis. “Unlike many advanced malware stocks, Gorilla has not yet adopted obfuscation technology and shows that it may still be under active development.”

Over the last few months, we’ve found that Android apps that embed Fakeapp Trojan propagated through the Google Play Store are also getting configurations that contain URLs to load using a DNS server.

Since its removal from the marketplace, these apps have the ability to receive external commands that can spoof famous and popular games and apps, and perform a variety of malicious actions, such as loading unwanted websites and providing phishing windows.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCurry, Butler helps the Warriors beat the Grizzlies on a play-in basketball news
Next Article Serb students cycling hundreds of miles to steal their dissatisfaction with the EU
user
  • Website

Related Posts

DHS warns Proilan hackers who are likely to target US networks after Iran’s nuclear attack

June 23, 2025

XDIGO Malware exploits Windows LNK flaws in Eastern European government attacks

June 23, 2025

How AI-enabled workflow automation helps SOCs reduce burnout

June 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI Startup Snowcap raises $23 million in funding to build a superconducting chip that could surpass Nvidia

DHS warns Proilan hackers who are likely to target US networks after Iran’s nuclear attack

Senators urge FTC to investigate Spotify’s higher priced bundled subscriptions

XDIGO Malware exploits Windows LNK flaws in Eastern European government attacks

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AI Startup Snowcap raises $23 million in funding to build a superconducting chip that could surpass Nvidia

BitMart’s R0AR List: $1R0R Makes CEX’s Debut

Gap 3 Partners FZCO will become Dubai’s first regulated virtual asset investment advisor with an operational license from VARA

Polemos has launched $PLMS tokens on MEXC and UNISWAP, moving forward with Web3 gaming infrastructure

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.