• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Chinese Cybersecurity Alert: Unraveling the Threat of Malware-Spreading Fake Mobile Base Stations

Paul Balo by Paul Balo
March 23, 2017
in Security, Telecom
Share on FacebookShare on Twitter

International cybersecurity firm, Check Point, has recently uncovered an ingenious yet disconcerting phishing scam playing out in China. Malicious actors have allegedly been leveraging fake mobile base stations to disseminate malware through seemingly innocent text messages. Yes, you read that right, fake base stations – a feat achievable to those armed with the right technology. But what’s the end game? To harness the power of a pernicious malware known as the “Swearing Trojan”.

Here is a bit of insight into this alarming scheme. These cybercriminals masquerade as popular Chinese telecom providers, China Telecom or China Unicom, and send text messages loaded with links. The catch here is that clicking the link releases the Swearing Trojan onto the unsuspecting user’s device, effectively providing the scammer unbridled access to their personal data.

The audacity of it doesn’t end here – the Swearing Trojan can bypass 2-factor authentication (2FA), therefore allowing the malware to pilfer even more sensitive data. But how exactly does it do this?

  • Firstly, the malware springs into action when a user installs an infected app, initiating the download of malicious payloads.
  • Next, operating from the shelter of the fake base transceiver stations (BTSs), the cybercriminals broadcast phishing SMS messages designed to look as if they are originating from legitimate Chinese telecom services providers like China Mobile and China Unicom.

Once the Trojan lands in a device, it commandeers the device’s Android SMS application and can then stealthily plunder sensitive information. Many apps, notably banking apps, that rely on 2FA for security are vulnerable to this malware.

A typical scenario unfolds like this: an unsuspecting user receives a message that appears to be from their telecom provider. The user then clicks on the provided link which in turn allows the Trojan to take over their messaging app, thus enabling the scammer to send out malware-laced messages through the user’s contact list. These messages could range from work-related content to links to provocative celebrity photos. Simultaneously, the Trojan silently reports on the user’s device activities back to the scammers.

There’s a silver lining though. According to the same Check Point report that uncovered the scam, the perpetrators are currently in custody following a police raid. However, researchers have noticed continued malware activity, which suggests that the apprehended culprits might only be a small part of a larger, ongoing operation.

Forewarned is forearmed. As digital citizens, we must remain vigilant and exercise caution when clicking on links that raise our suspicions. Remember, nearly 70% of cybersecurity threats rely on the user to click on a URL, initiating the malware infection process. Stay safe, stay smart.

Related Posts:

  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • Crypto-scams
    What Is A Crypto Phishing Scam &; How To Detect A…
  • tiktok-phone-american-flag-GettyImages-1246687576-2400-1500×1000
    A Case For Why The United States Government Should…
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • openai logo
    OpenAI Blocks ChatGPT Accounts Linked to…
  • Jessie Kipf (1)
    Investigating the Intriguing Story of How the FBI…
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • VoidProxy_adminPanel_Login
    VoidProxy Targets Microsoft 365 & Google Accounts

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: base stationbtscyber securityhackersmalwaresecurityswearing trojantelecomtelecom masts
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • KB5070311 Update Resolves File Explorer and Search Bugs December 2, 2025
  • KB5070311 Update Causes Dark Mode Flash Issue, Microsoft Confirms December 2, 2025
  • Data Centers to Consume 300% More Energy by 2035 December 2, 2025
  • Google-Backed Fusion Startup Moves to Commercialize Neutral-Beam Tech December 2, 2025
  • OpenAI Criticised for Ad-Like App Recommendations December 2, 2025
  • Google Patches 107 Flaws Including 2 Android Zero-Days December 2, 2025
  • AWS Launches AI Tool to Speed Outage Recovery December 2, 2025
  • AWS Now Operates Nearly 900 Global Data Centers December 2, 2025
  • AWS Transform Aims to Modernize Legacy Code at Scale December 2, 2025
  • Amazon Launches Nova 2 and Nova Forge to Push Enterprise AI Leadership December 2, 2025
  • AWS Launches Trainium 3, Its Most Powerful AI Chip Yet December 2, 2025
  • Google Previews Major Gemini App Update December 2, 2025

Browse Archives

December 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
293031 
« Nov    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.