A new version of Triada spreads embedded in the firmware of Android devices
Kaspersky researchers have discovered a new version of the Triada Trojan being distributed through infected Android device firmware. The malware is embedded into system files before devices are sold, making it nearly impossible to remove. It infects the Zygote process to compromise all apps on the device. The Trojan's modular architecture allows attackers to deliver targeted payloads for stealing cryptocurrency, credentials, and other sensitive data from popular apps like WhatsApp, Facebook, and banking apps. It can also intercept SMS messages, make calls, and act as a reverse proxy. Over 4,500 infected devices have been detected worldwide, with the highest numbers in Russia, UK, Netherlands, Germany and Brazil. The attackers have stolen over $264,000 in cryptocurrency so far.
AI Analysis
Technical Summary
The Triada Trojan is a sophisticated Android malware strain that has evolved to be embedded directly into the firmware of infected devices prior to sale. This new version discovered by Kaspersky researchers leverages firmware-level infection, making it extremely persistent and difficult to remove through conventional means such as factory resets or app uninstallations. The malware compromises the Zygote process, which is the core Android process responsible for launching all apps. By infecting Zygote, Triada gains the ability to inject malicious code into every app running on the device, thereby achieving system-wide control and surveillance capabilities. Its modular architecture allows attackers to dynamically load and execute targeted payloads tailored to steal sensitive information from popular applications including WhatsApp, Facebook, and various banking apps. The Trojan can intercept SMS messages, make unauthorized calls, and operate as a reverse proxy, enabling attackers to relay traffic and potentially bypass network security controls. Over 4,500 infected devices have been identified globally, with significant concentrations in Russia, the United Kingdom, the Netherlands, Germany, and Brazil. Financially, the attackers have successfully stolen over $264,000 in cryptocurrency, highlighting the malware’s effectiveness in targeting digital assets. The infection vector through firmware embedding indicates a supply chain compromise or malicious firmware pre-installation, which poses a serious challenge for detection and remediation. The malware’s capabilities align with several MITRE ATT&CK techniques including credential dumping (T1552.001), input capture (T1056.001), data from local system (T1570), and command and control via reverse proxy (T1041). Given its stealth, persistence, and broad impact on confidentiality and integrity, Triada represents a significant threat to Android device users and organizations relying on these devices for secure communications and transactions.
Potential Impact
For European organizations, the Triada Trojan presents a multifaceted risk. The infection of Android devices at the firmware level means that employees’ mobile devices used for corporate communications and access to sensitive applications could be compromised without detection. This jeopardizes confidentiality by enabling theft of credentials and sensitive data from widely used apps such as WhatsApp and banking applications, potentially leading to unauthorized access to corporate accounts and financial losses. The interception of SMS messages and unauthorized call capabilities further expose organizations to social engineering and fraud risks, including bypassing two-factor authentication mechanisms reliant on SMS. The reverse proxy functionality could allow attackers to exfiltrate data stealthily or pivot within corporate networks if infected devices connect to internal resources. The persistence of the malware complicates incident response and remediation efforts, increasing downtime and operational disruption. Given the modular nature of the Trojan, attackers can tailor payloads to specific targets, increasing the risk to high-value European organizations, especially those in finance, telecommunications, and government sectors. The presence of infections in countries like the UK, Netherlands, and Germany underscores the threat’s relevance to European markets. Additionally, the theft of cryptocurrency assets highlights risks for organizations and individuals involved in digital asset management or fintech services. Overall, Triada’s firmware-level infection vector and broad capabilities pose a significant threat to the confidentiality, integrity, and availability of mobile communications and data within European organizations.
Mitigation Recommendations
Mitigating the Triada Trojan requires a combination of supply chain security, device management, and user awareness strategies tailored to the firmware-level infection vector. First, organizations should procure Android devices only from trusted vendors with verified supply chains and consider implementing hardware attestation or secure boot mechanisms to detect unauthorized firmware modifications. Mobile Device Management (MDM) solutions should be deployed to enforce security policies, monitor device integrity, and restrict installation of unauthorized apps or firmware updates. Regular firmware integrity checks and anomaly detection tools can help identify compromised devices. Organizations should educate users about the risks of using devices from unverified sources and encourage reporting of unusual device behavior. For critical users, consider deploying endpoint detection and response (EDR) solutions capable of monitoring Android devices for suspicious activity, including unusual network traffic indicative of reverse proxy operations. Multi-factor authentication methods that do not rely solely on SMS should be enforced to mitigate interception risks. Incident response plans must include procedures for handling firmware-level infections, which may require device replacement rather than software remediation. Collaboration with device manufacturers and security researchers to share threat intelligence and firmware updates is essential. Finally, organizations should monitor cryptocurrency transactions and accounts for suspicious activity as part of their broader cybersecurity posture.
Affected Countries
United Kingdom, Netherlands, Germany, Russia
Indicators of Compromise
- hash: 01dff60fbf8cdf98980150eb15617e41
- hash: 04e485833e53aceb259198d1fcba7eaf
- hash: 11aa55cd3556afa80412e512acfbd01d
- hash: 18fef4b6e229fc01c8b9921bb0353bb0
- hash: 195e0f334beb34c471352179d422c42f
- hash: 1d582e2517905b853ec9ebfe77759d15
- hash: 21be50a028a505b1d23955abfd2bdb3e
- hash: 2ac4d8e1077dce6f4d2ba9875b987ca7
- hash: 2ac5414f627f8df2e902fc34a73faf44
- hash: 2e98c16d949022e42956aaa9af908187
- hash: 308e35fb48d98d9e466e4dfd1ba6ee73
- hash: 37fd87f46e95f431b1977d8c5741d2d5
- hash: 3dc21967e6fab9518275960933c90d04
- hash: 3f887477091e67c6aaca15bce622f485
- hash: 43adb868af3812b8f0c47e38fb93746a
- hash: 44a08dc22b45b9418ed427fd24c192c6
- hash: 511443977de2d07c3ee0cee3edae8dc8
- hash: 554f0de0bddf30589482315fe336ea72
- hash: 716f0896b22c2fdcb0e3ee56b7c5212f
- hash: 72cbbc58776ddc44abaa557325440bfb
- hash: 7b8905af721158731d24d0d06e6cb27e
- hash: 83dbc4b95f9ae8a83811163b301fe8c7
- hash: 8892c6decebba3e26c57b20af7ad4cca
- hash: 89c3475be8dba92f4ee7de0d981603c1
- hash: 8f0e5f86046faed1d06bca7d3e48c0b8
- hash: 952cc6accc50b75a08bb429fb838bff7
- hash: 98ece45e75f93c5089411972f9655b97
- hash: 993eb2f8bf8b5c01b30e3044c3bc10a3
- hash: 9dd92503bd21d12ff0f2b9740fb6e529
- hash: a4f16015204db28f5654bb64775d75ad
- hash: a7127978fac175c9a14cd8d894192f78
- hash: a9a106b9df360ec9d28f5dfaf4b1f0b5
- hash: b187551675a234c3584db4aab2cc83a9
- hash: b87706f7fcb21f3a4dfdd2865b2fa733
- hash: b8a745bdc0e083ffc88a524c7f465140
- hash: c30c309e175905ffcbd17adb55009240
- hash: c4efe3733710d251cb041a916a46bc44
- hash: d5bc1298e436424086cb52508fb104b1
- hash: dc731e55a552caed84d04627e96906d5
- hash: e9029811df1dd8acacfe69450b033804
- hash: e961cb0c7d317ace2ff6159efe30276a
- hash: f468a29f836d2bba7a2b1a638c5bebf0
- hash: fb937b1b15fd56c9d8e5bb6b90e0e24a
- hash: fce117a9d7c8c73e5f56bda7437bdb28
- domain: bincdi.birxpk.com
- domain: jmll4.66foh90o.com
- domain: lvqtcqd.pngkcal.com
- domain: mp2y3.sm20j.xyz
A new version of Triada spreads embedded in the firmware of Android devices
Description
Kaspersky researchers have discovered a new version of the Triada Trojan being distributed through infected Android device firmware. The malware is embedded into system files before devices are sold, making it nearly impossible to remove. It infects the Zygote process to compromise all apps on the device. The Trojan's modular architecture allows attackers to deliver targeted payloads for stealing cryptocurrency, credentials, and other sensitive data from popular apps like WhatsApp, Facebook, and banking apps. It can also intercept SMS messages, make calls, and act as a reverse proxy. Over 4,500 infected devices have been detected worldwide, with the highest numbers in Russia, UK, Netherlands, Germany and Brazil. The attackers have stolen over $264,000 in cryptocurrency so far.
AI-Powered Analysis
Technical Analysis
The Triada Trojan is a sophisticated Android malware strain that has evolved to be embedded directly into the firmware of infected devices prior to sale. This new version discovered by Kaspersky researchers leverages firmware-level infection, making it extremely persistent and difficult to remove through conventional means such as factory resets or app uninstallations. The malware compromises the Zygote process, which is the core Android process responsible for launching all apps. By infecting Zygote, Triada gains the ability to inject malicious code into every app running on the device, thereby achieving system-wide control and surveillance capabilities. Its modular architecture allows attackers to dynamically load and execute targeted payloads tailored to steal sensitive information from popular applications including WhatsApp, Facebook, and various banking apps. The Trojan can intercept SMS messages, make unauthorized calls, and operate as a reverse proxy, enabling attackers to relay traffic and potentially bypass network security controls. Over 4,500 infected devices have been identified globally, with significant concentrations in Russia, the United Kingdom, the Netherlands, Germany, and Brazil. Financially, the attackers have successfully stolen over $264,000 in cryptocurrency, highlighting the malware’s effectiveness in targeting digital assets. The infection vector through firmware embedding indicates a supply chain compromise or malicious firmware pre-installation, which poses a serious challenge for detection and remediation. The malware’s capabilities align with several MITRE ATT&CK techniques including credential dumping (T1552.001), input capture (T1056.001), data from local system (T1570), and command and control via reverse proxy (T1041). Given its stealth, persistence, and broad impact on confidentiality and integrity, Triada represents a significant threat to Android device users and organizations relying on these devices for secure communications and transactions.
Potential Impact
For European organizations, the Triada Trojan presents a multifaceted risk. The infection of Android devices at the firmware level means that employees’ mobile devices used for corporate communications and access to sensitive applications could be compromised without detection. This jeopardizes confidentiality by enabling theft of credentials and sensitive data from widely used apps such as WhatsApp and banking applications, potentially leading to unauthorized access to corporate accounts and financial losses. The interception of SMS messages and unauthorized call capabilities further expose organizations to social engineering and fraud risks, including bypassing two-factor authentication mechanisms reliant on SMS. The reverse proxy functionality could allow attackers to exfiltrate data stealthily or pivot within corporate networks if infected devices connect to internal resources. The persistence of the malware complicates incident response and remediation efforts, increasing downtime and operational disruption. Given the modular nature of the Trojan, attackers can tailor payloads to specific targets, increasing the risk to high-value European organizations, especially those in finance, telecommunications, and government sectors. The presence of infections in countries like the UK, Netherlands, and Germany underscores the threat’s relevance to European markets. Additionally, the theft of cryptocurrency assets highlights risks for organizations and individuals involved in digital asset management or fintech services. Overall, Triada’s firmware-level infection vector and broad capabilities pose a significant threat to the confidentiality, integrity, and availability of mobile communications and data within European organizations.
Mitigation Recommendations
Mitigating the Triada Trojan requires a combination of supply chain security, device management, and user awareness strategies tailored to the firmware-level infection vector. First, organizations should procure Android devices only from trusted vendors with verified supply chains and consider implementing hardware attestation or secure boot mechanisms to detect unauthorized firmware modifications. Mobile Device Management (MDM) solutions should be deployed to enforce security policies, monitor device integrity, and restrict installation of unauthorized apps or firmware updates. Regular firmware integrity checks and anomaly detection tools can help identify compromised devices. Organizations should educate users about the risks of using devices from unverified sources and encourage reporting of unusual device behavior. For critical users, consider deploying endpoint detection and response (EDR) solutions capable of monitoring Android devices for suspicious activity, including unusual network traffic indicative of reverse proxy operations. Multi-factor authentication methods that do not rely solely on SMS should be enforced to mitigate interception risks. Incident response plans must include procedures for handling firmware-level infections, which may require device replacement rather than software remediation. Collaboration with device manufacturers and security researchers to share threat intelligence and firmware updates is essential. Finally, organizations should monitor cryptocurrency transactions and accounts for suspicious activity as part of their broader cybersecurity posture.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/triada-trojan-modules-analysis/116380"]
- Adversary
- Triada
- Pulse Id
- 680bbbaa71bc4685688f2943
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash01dff60fbf8cdf98980150eb15617e41 | — | |
hash04e485833e53aceb259198d1fcba7eaf | — | |
hash11aa55cd3556afa80412e512acfbd01d | — | |
hash18fef4b6e229fc01c8b9921bb0353bb0 | — | |
hash195e0f334beb34c471352179d422c42f | — | |
hash1d582e2517905b853ec9ebfe77759d15 | — | |
hash21be50a028a505b1d23955abfd2bdb3e | — | |
hash2ac4d8e1077dce6f4d2ba9875b987ca7 | — | |
hash2ac5414f627f8df2e902fc34a73faf44 | — | |
hash2e98c16d949022e42956aaa9af908187 | — | |
hash308e35fb48d98d9e466e4dfd1ba6ee73 | — | |
hash37fd87f46e95f431b1977d8c5741d2d5 | — | |
hash3dc21967e6fab9518275960933c90d04 | — | |
hash3f887477091e67c6aaca15bce622f485 | — | |
hash43adb868af3812b8f0c47e38fb93746a | — | |
hash44a08dc22b45b9418ed427fd24c192c6 | — | |
hash511443977de2d07c3ee0cee3edae8dc8 | — | |
hash554f0de0bddf30589482315fe336ea72 | — | |
hash716f0896b22c2fdcb0e3ee56b7c5212f | — | |
hash72cbbc58776ddc44abaa557325440bfb | — | |
hash7b8905af721158731d24d0d06e6cb27e | — | |
hash83dbc4b95f9ae8a83811163b301fe8c7 | — | |
hash8892c6decebba3e26c57b20af7ad4cca | — | |
hash89c3475be8dba92f4ee7de0d981603c1 | — | |
hash8f0e5f86046faed1d06bca7d3e48c0b8 | — | |
hash952cc6accc50b75a08bb429fb838bff7 | — | |
hash98ece45e75f93c5089411972f9655b97 | — | |
hash993eb2f8bf8b5c01b30e3044c3bc10a3 | — | |
hash9dd92503bd21d12ff0f2b9740fb6e529 | — | |
hasha4f16015204db28f5654bb64775d75ad | — | |
hasha7127978fac175c9a14cd8d894192f78 | — | |
hasha9a106b9df360ec9d28f5dfaf4b1f0b5 | — | |
hashb187551675a234c3584db4aab2cc83a9 | — | |
hashb87706f7fcb21f3a4dfdd2865b2fa733 | — | |
hashb8a745bdc0e083ffc88a524c7f465140 | — | |
hashc30c309e175905ffcbd17adb55009240 | — | |
hashc4efe3733710d251cb041a916a46bc44 | — | |
hashd5bc1298e436424086cb52508fb104b1 | — | |
hashdc731e55a552caed84d04627e96906d5 | — | |
hashe9029811df1dd8acacfe69450b033804 | — | |
hashe961cb0c7d317ace2ff6159efe30276a | — | |
hashf468a29f836d2bba7a2b1a638c5bebf0 | — | |
hashfb937b1b15fd56c9d8e5bb6b90e0e24a | — | |
hashfce117a9d7c8c73e5f56bda7437bdb28 | — |
Domain
Value | Description | Copy |
---|---|---|
domainbincdi.birxpk.com | — | |
domainjmll4.66foh90o.com | — | |
domainlvqtcqd.pngkcal.com | — | |
domainmp2y3.sm20j.xyz | — |
Threat ID: 6833406d0acd01a2492819c9
Added to database: 5/25/2025, 4:08:13 PM
Last enriched: 6/24/2025, 4:35:21 PM
Last updated: 7/28/2025, 6:47:54 PM
Views: 17
Related Threats
ThreatFox IOCs for 2025-08-13
MediumEfimer Trojan Steals Crypto, Hacks WordPress Sites via Torrents and Phishing
MediumSilent Watcher: Dissecting Cmimai Stealer's VBS Payload
MediumCastleLoader Analysis
MediumThe Dark Side of Parental Control Apps
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.