Most malware infections on mobile devices such as mobile phones include downloading certain user powers for a file or coding. But a new blow in Europe, It endangers the device even before reaching the hands of the victims.

Kaspersky, the CyberRsecurity Laboratory, detailed a fraudulent operation, which contains at least 2,600 victims and will cause at least $ 270,000 (or $ 1.5 million in direct currency transformation).

https://www.youtube.com/watch?v=c22Lygtaibo

This impact uses already installed malicious software on fake Android mobile phones and facilitates information and money theft while avoiding device protection systems.

For now, although it is limited to users of countries such as Russia and Germany, this new fraud plan can be reproduced in other regions and may require the consumer’s attention.

How does bad software work on pirate mobile phones?

The threat is Triada, a highly privatizable Trojan horse that has existed since 2016. It is usually found with small variations in new impacts in cheap cellular cell systems or modified WhatsApp versions.

In addition to distributing malicious software, cyber criminal group also operates in parallel trade or production lines. Because Triada fake android mobile phones pre -installedseemingly mimic the models of large manufacturers.

These generic devices It is usually sold in low -priced stores at low prices to attract the consumer “And perhaps not even knowing that it sells stable devices.” Shortly after purchasing the phone and logging in in accounts of the bank, social networks and Google, the criminal activity begins.

According to Kaspersky, Triada can perform actions such as stealing access data, falsifying your identity in messengers such as WhatsApp and Telegram, kidnapping Cryptomeda wallets, remote running, and monitoring or changing a browser activity.

Models and big brands are the biggest goals of fraud. (Picture: Description/Samsung)

In addition to all these, malicious software can still start or direct the consumer more threats on the device.

How can you protect yourself from such deception

To avoid falling into a coup like researchers, the most appropriate suggestion is to buy smartphones and other electronics by authorized dealers such as official channels or reliable stores.

Also, analyze the device obtained to check if it is really legitimate. This can be done when checking the IMEI device, search for anatel gasket from the packaging and check the system settings if the features are matching with the expected.

If you suspect something and do not want to return the device, Kaspersky recommends you to reset the factory settings and reinstall Android from a “clean” version of Android provided by Google or from a ROM you want.

Did you know that remote ransom software has become popular with one of the main and dangerous digital threats for companies? Learn more about a special theme from Tecmundo.

Source: Tec Mundo

Previous articleAny mobile phone can now use the direct camera of Google Gemini
Next articleAmazon wants to buy Tiktok, draws attention to the website
I am a passionate and hardworking journalist with an eye for detail. I specialize in the field of news reporting, and have been writing for Gadget Onus, a renowned online news site, since 2019. As the author of their Hot News section, I’m proud to be at the forefront of today’s headlines and current affairs.

LEAVE A REPLY

Please enter your comment!
Please enter your name here