Skip to main content

A new version of Triada spreads embedded in the firmware of Android devices

Medium
Published: Fri Apr 25 2025 (04/25/2025, 16:43:22 UTC)
Source: AlienVault OTX General

Description

Kaspersky researchers have discovered a new version of the Triada Trojan being distributed through infected Android device firmware. The malware is embedded into system files before devices are sold, making it nearly impossible to remove. It infects the Zygote process to compromise all apps on the device. The Trojan's modular architecture allows attackers to deliver targeted payloads for stealing cryptocurrency, credentials, and other sensitive data from popular apps like WhatsApp, Facebook, and banking apps. It can also intercept SMS messages, make calls, and act as a reverse proxy. Over 4,500 infected devices have been detected worldwide, with the highest numbers in Russia, UK, Netherlands, Germany and Brazil. The attackers have stolen over $264,000 in cryptocurrency so far.

AI-Powered Analysis

AILast updated: 06/24/2025, 16:35:21 UTC

Technical Analysis

The Triada Trojan is a sophisticated Android malware strain that has evolved to be embedded directly into the firmware of infected devices prior to sale. This new version discovered by Kaspersky researchers leverages firmware-level infection, making it extremely persistent and difficult to remove through conventional means such as factory resets or app uninstallations. The malware compromises the Zygote process, which is the core Android process responsible for launching all apps. By infecting Zygote, Triada gains the ability to inject malicious code into every app running on the device, thereby achieving system-wide control and surveillance capabilities. Its modular architecture allows attackers to dynamically load and execute targeted payloads tailored to steal sensitive information from popular applications including WhatsApp, Facebook, and various banking apps. The Trojan can intercept SMS messages, make unauthorized calls, and operate as a reverse proxy, enabling attackers to relay traffic and potentially bypass network security controls. Over 4,500 infected devices have been identified globally, with significant concentrations in Russia, the United Kingdom, the Netherlands, Germany, and Brazil. Financially, the attackers have successfully stolen over $264,000 in cryptocurrency, highlighting the malware’s effectiveness in targeting digital assets. The infection vector through firmware embedding indicates a supply chain compromise or malicious firmware pre-installation, which poses a serious challenge for detection and remediation. The malware’s capabilities align with several MITRE ATT&CK techniques including credential dumping (T1552.001), input capture (T1056.001), data from local system (T1570), and command and control via reverse proxy (T1041). Given its stealth, persistence, and broad impact on confidentiality and integrity, Triada represents a significant threat to Android device users and organizations relying on these devices for secure communications and transactions.

Potential Impact

For European organizations, the Triada Trojan presents a multifaceted risk. The infection of Android devices at the firmware level means that employees’ mobile devices used for corporate communications and access to sensitive applications could be compromised without detection. This jeopardizes confidentiality by enabling theft of credentials and sensitive data from widely used apps such as WhatsApp and banking applications, potentially leading to unauthorized access to corporate accounts and financial losses. The interception of SMS messages and unauthorized call capabilities further expose organizations to social engineering and fraud risks, including bypassing two-factor authentication mechanisms reliant on SMS. The reverse proxy functionality could allow attackers to exfiltrate data stealthily or pivot within corporate networks if infected devices connect to internal resources. The persistence of the malware complicates incident response and remediation efforts, increasing downtime and operational disruption. Given the modular nature of the Trojan, attackers can tailor payloads to specific targets, increasing the risk to high-value European organizations, especially those in finance, telecommunications, and government sectors. The presence of infections in countries like the UK, Netherlands, and Germany underscores the threat’s relevance to European markets. Additionally, the theft of cryptocurrency assets highlights risks for organizations and individuals involved in digital asset management or fintech services. Overall, Triada’s firmware-level infection vector and broad capabilities pose a significant threat to the confidentiality, integrity, and availability of mobile communications and data within European organizations.

Mitigation Recommendations

Mitigating the Triada Trojan requires a combination of supply chain security, device management, and user awareness strategies tailored to the firmware-level infection vector. First, organizations should procure Android devices only from trusted vendors with verified supply chains and consider implementing hardware attestation or secure boot mechanisms to detect unauthorized firmware modifications. Mobile Device Management (MDM) solutions should be deployed to enforce security policies, monitor device integrity, and restrict installation of unauthorized apps or firmware updates. Regular firmware integrity checks and anomaly detection tools can help identify compromised devices. Organizations should educate users about the risks of using devices from unverified sources and encourage reporting of unusual device behavior. For critical users, consider deploying endpoint detection and response (EDR) solutions capable of monitoring Android devices for suspicious activity, including unusual network traffic indicative of reverse proxy operations. Multi-factor authentication methods that do not rely solely on SMS should be enforced to mitigate interception risks. Incident response plans must include procedures for handling firmware-level infections, which may require device replacement rather than software remediation. Collaboration with device manufacturers and security researchers to share threat intelligence and firmware updates is essential. Finally, organizations should monitor cryptocurrency transactions and accounts for suspicious activity as part of their broader cybersecurity posture.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/triada-trojan-modules-analysis/116380"]
Adversary
Triada
Pulse Id
680bbbaa71bc4685688f2943

Indicators of Compromise

Hash

ValueDescriptionCopy
hash01dff60fbf8cdf98980150eb15617e41
hash04e485833e53aceb259198d1fcba7eaf
hash11aa55cd3556afa80412e512acfbd01d
hash18fef4b6e229fc01c8b9921bb0353bb0
hash195e0f334beb34c471352179d422c42f
hash1d582e2517905b853ec9ebfe77759d15
hash21be50a028a505b1d23955abfd2bdb3e
hash2ac4d8e1077dce6f4d2ba9875b987ca7
hash2ac5414f627f8df2e902fc34a73faf44
hash2e98c16d949022e42956aaa9af908187
hash308e35fb48d98d9e466e4dfd1ba6ee73
hash37fd87f46e95f431b1977d8c5741d2d5
hash3dc21967e6fab9518275960933c90d04
hash3f887477091e67c6aaca15bce622f485
hash43adb868af3812b8f0c47e38fb93746a
hash44a08dc22b45b9418ed427fd24c192c6
hash511443977de2d07c3ee0cee3edae8dc8
hash554f0de0bddf30589482315fe336ea72
hash716f0896b22c2fdcb0e3ee56b7c5212f
hash72cbbc58776ddc44abaa557325440bfb
hash7b8905af721158731d24d0d06e6cb27e
hash83dbc4b95f9ae8a83811163b301fe8c7
hash8892c6decebba3e26c57b20af7ad4cca
hash89c3475be8dba92f4ee7de0d981603c1
hash8f0e5f86046faed1d06bca7d3e48c0b8
hash952cc6accc50b75a08bb429fb838bff7
hash98ece45e75f93c5089411972f9655b97
hash993eb2f8bf8b5c01b30e3044c3bc10a3
hash9dd92503bd21d12ff0f2b9740fb6e529
hasha4f16015204db28f5654bb64775d75ad
hasha7127978fac175c9a14cd8d894192f78
hasha9a106b9df360ec9d28f5dfaf4b1f0b5
hashb187551675a234c3584db4aab2cc83a9
hashb87706f7fcb21f3a4dfdd2865b2fa733
hashb8a745bdc0e083ffc88a524c7f465140
hashc30c309e175905ffcbd17adb55009240
hashc4efe3733710d251cb041a916a46bc44
hashd5bc1298e436424086cb52508fb104b1
hashdc731e55a552caed84d04627e96906d5
hashe9029811df1dd8acacfe69450b033804
hashe961cb0c7d317ace2ff6159efe30276a
hashf468a29f836d2bba7a2b1a638c5bebf0
hashfb937b1b15fd56c9d8e5bb6b90e0e24a
hashfce117a9d7c8c73e5f56bda7437bdb28

Domain

ValueDescriptionCopy
domainbincdi.birxpk.com
domainjmll4.66foh90o.com
domainlvqtcqd.pngkcal.com
domainmp2y3.sm20j.xyz

Threat ID: 6833406d0acd01a2492819c9

Added to database: 5/25/2025, 4:08:13 PM

Last enriched: 6/24/2025, 4:35:21 PM

Last updated: 7/28/2025, 6:47:54 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats