Logo
logo
EnglishLanguage
logo
Listen live
HomeGlossaryContact us
Find us on social media
Advertisement for 5fXBptIOLaA?si=-QAVpQnM0DVFw-al

Is your Android phone fake? It might be stealing crypto

A growing number of devices are arriving infected—compromising accounts before users even log in

Ian AdlawanProfile
By Ian AdlawanApr. 4th - 1pm
4 min read
Person using Android phone
Malware baked into counterfeit devices can steal crypto and passwords without the user ever noticing. Photo: Unsplash / Daniel Romero

What you don’t know about your Android phone could be costing you your crypto.

Cybersecurity firm Kaspersky has uncovered a worrying trend: counterfeit Android smartphones, sold online at steep discounts, are being shipped with pre-installed malware designed to steal cryptocurrency and sensitive data. The malware in question? A sophisticated trojan called Triada, quietly embedded into the phone’s system before it even reaches your hands.

“Attackers have already siphoned off around $270,000 in various cryptocurrencies,” Dmitry Kalinin, a cybersecurity expert at Kaspersky told Cointelegraph. “That number could be much higher, especially with Monero and other privacy coins involved.”

The trojan doesn’t just stop at crypto theft. It can also intercept messages, including two-factor authentication codes, and extract login credentials – all while running silently in the background.

Unlike typical malware that’s downloaded through shady apps, Triada is baked directly into the firmware – the foundational software layer of the device. This points to a compromise somewhere in the supply chain, likely during manufacturing or packaging.

To make matters worse, even legit-looking online sellers might unknowingly distribute these infected devices. Kaspersky has already confirmed more than 2,600 infections across multiple countries, with most cases reported in Russia during Q1 2025.

Why fake phones are a gift to hackers

Original smartphone manufacturers are required to comply with strict security protocols and consumer protection laws. Counterfeiters? Not so much.

Without proper oversight, these fake phones often come with no meaningful security measures, making them prime vessels for malware. Worse, they may be deliberately programmed to bypass crypto wallet protections and extract sensitive data like private keys and passphrases.

While legitimate phones offer trusted hardware security modules and support for encrypted storage, counterfeit phones can behave like Trojan horses – appearing functional on the outside but actively working against the user.

How to avoid counterfeit phones

If you're using your phone for crypto transactions, security should be a top priority. Here’s how to spot a counterfeit device before it costs you your assets:

  • Buy only from authorized retailers: Stick to official stores or verified distributors. Avoid “too good to be true” deals on unknown sites.

  • Check the IMEI number: Dial *#06# and compare it against the manufacturer’s database. If there’s a mismatch, that’s a red flag.

  • Be careful with second-hand phones: Used devices are more likely to be tampered with. If you must buy one, inspect it thoroughly and reset it to factory settings before use.

  • Watch for performance quirks: Unexpected crashes, missing features, or strange background activity could be signs of a compromised system.

By remaining vigilant and adhering to these guidelines, users can significantly reduce the risk of falling victim to counterfeit devices and safeguard their cryptocurrency assets effectively.

Are mobile wallets worth the risk?

This revelation has reignited a long-running debate in the crypto world: should you store crypto on your phone at all?

Mobile wallets have surged in popularity thanks to their ease of use and accessibility. You can send, receive, and manage your crypto on the go, with features like biometric login and two-factor authentication adding layers of security.

But some in the community remain skeptical.

Critics argue that general-purpose smartphones are inherently risky, especially compared to hardware wallets. Phones are always connected to the internet, vulnerable to SIM-swapping, malware, and physical theft. And even the best security app can’t protect users from poor habits like skipping updates or using public Wi-Fi.

A growing consensus is forming: mobile wallets are fine for day-to-day transactions, but serious holdings belong in cold storage – offline devices designed specifically for crypto security.

As crypto adoption expands, so do the tactics of bad actors. From pre-installed malware to fake phones, the threats are getting sneakier and more sophisticated. But with awareness and the right precautions, you can stay one step ahead.

Don’t let a counterfeit phone rob you blind. Verify your device, secure your wallets, and treat your crypto like real money – because it is.

Share :
Advertisement for 5fXBptIOLaA?si=-QAVpQnM0DVFw-al

We use cookies on our site.