• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Chinese Cybersecurity Alert: Unraveling the Threat of Malware-Spreading Fake Mobile Base Stations

Paul Balo by Paul Balo
March 23, 2017
in Security, Telecom
Share on FacebookShare on Twitter

International cybersecurity firm, Check Point, has recently uncovered an ingenious yet disconcerting phishing scam playing out in China. Malicious actors have allegedly been leveraging fake mobile base stations to disseminate malware through seemingly innocent text messages. Yes, you read that right, fake base stations – a feat achievable to those armed with the right technology. But what’s the end game? To harness the power of a pernicious malware known as the “Swearing Trojan”.

Here is a bit of insight into this alarming scheme. These cybercriminals masquerade as popular Chinese telecom providers, China Telecom or China Unicom, and send text messages loaded with links. The catch here is that clicking the link releases the Swearing Trojan onto the unsuspecting user’s device, effectively providing the scammer unbridled access to their personal data.

The audacity of it doesn’t end here – the Swearing Trojan can bypass 2-factor authentication (2FA), therefore allowing the malware to pilfer even more sensitive data. But how exactly does it do this?

  • Firstly, the malware springs into action when a user installs an infected app, initiating the download of malicious payloads.
  • Next, operating from the shelter of the fake base transceiver stations (BTSs), the cybercriminals broadcast phishing SMS messages designed to look as if they are originating from legitimate Chinese telecom services providers like China Mobile and China Unicom.

Once the Trojan lands in a device, it commandeers the device’s Android SMS application and can then stealthily plunder sensitive information. Many apps, notably banking apps, that rely on 2FA for security are vulnerable to this malware.

A typical scenario unfolds like this: an unsuspecting user receives a message that appears to be from their telecom provider. The user then clicks on the provided link which in turn allows the Trojan to take over their messaging app, thus enabling the scammer to send out malware-laced messages through the user’s contact list. These messages could range from work-related content to links to provocative celebrity photos. Simultaneously, the Trojan silently reports on the user’s device activities back to the scammers.

There’s a silver lining though. According to the same Check Point report that uncovered the scam, the perpetrators are currently in custody following a police raid. However, researchers have noticed continued malware activity, which suggests that the apprehended culprits might only be a small part of a larger, ongoing operation.

Forewarned is forearmed. As digital citizens, we must remain vigilant and exercise caution when clicking on links that raise our suspicions. Remember, nearly 70% of cybersecurity threats rely on the user to click on a URL, initiating the malware infection process. Stay safe, stay smart.

Related Posts:

  • google office
    Google Targets China-Linked Hackers After 53 Attacks
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • linkedin messaging
    How Hackers Spread RAT Malware via DLL Sideloading…
  • Crypto-scams
    What Is A Crypto Phishing Scam &; How To Detect A…
  • tiktok-phone-american-flag-GettyImages-1246687576-2400-1500x1000
    A Case For Why The United States Government Should…
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • openai logo
    OpenAI Blocks ChatGPT Accounts Linked to…
  • Jessie Kipf (1)
    Investigating the Intriguing Story of How the FBI…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: base stationbtscyber securityhackersmalwaresecurityswearing trojantelecomtelecom masts
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • South Africa Reviews Canal+–MultiChoice Deal Amid Showmax Concerns March 19, 2026
  • Baidu, Tencent Boost AI Push Amid OpenClaw Boom March 19, 2026
  • Researchers Warn DarkSword Exploit Could Hit Millions of iPhones March 18, 2026
  • Tech Giants Join Forces in New Coalition to Tackle Digital Scams March 18, 2026
  • Instagram Rolls Out Eight AI Voice Filters for Voice Messages March 18, 2026
  • Google Brings Gemini Personal Intelligence to Free Users March 17, 2026
  • Microsoft Restructures Copilot Leadership as Suleyman Shifts Focus March 17, 2026
  • OpenAI Launches GPT-5.4 Mini and Nano Models March 17, 2026
  • Samsung to Halt Sales of $2,899 Tri-Fold Phone March 17, 2026
  • Nvidia CloudXR Brings RTX Streaming to Apple Vision Pro March 17, 2026
  • MTN Revenue Jumps 23% on Data and Fintech Growth March 17, 2026
  • Nvidia Unveils AI Data Factory Blueprint for Robotics March 17, 2026

Browse Archives

March 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
« Feb    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.