Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Android Trojan Crocodilus Abuses Accessibility for Banking and Seizing Crypto Credentials
Identity

New Android Trojan Crocodilus Abuses Accessibility for Banking and Seizing Crypto Credentials

userBy userMarch 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 29, 2025Ravi LakshmananThreat Intelligence/Mobile Security

Cybersecurity researchers have discovered a new Android banking malware called Crocodilus, which was primarily designed to target users in Spain and Turkey.

“Crocodilus enters the scene not as a simple clone, but as a full-scale threat from the start, with modern techniques like remote control, black screen overlays and advanced data harvesting with accessibility logging,” says Threatfabric.

Like other bank Trojans of this type, malware is designed to promote takeover (DTO) on devices and ultimately carry out fraudulent transactions. Analysis of source code and debug messages revealed that the malware author speaks Turkish.

Cybersecurity

The Crocodilus artifact, analyzed by Dutch mobile security company Masquerade, acts as Google Chrome (“Quizzical.washbowl.calamity”) that acts as a dropper that can bypass Android 13+ restrictions.

Once installed and launched, the app will request permission to the Android Accessibility Service. The remote server and contacts are then established and requested further instructions, a list of targeted financial applications, and HTML overlays used to steal credentials.

Instead of providing a fake login page to capture login information, Crocodilus can also display an alert message urging victims to back up their seed phrases within 12, or target cryptocurrency wallets with an overlay that displays alert messages that are at risk of losing access to their wallets.

Mobile Security

This social engineering trick is nothing more than a trick by a threat actor that will guide the victim to move into a seed phrase. It is harvested by the abuse of accessibility services, thereby gaining complete control of the wallet and allowing assets to be discharged.

“It runs continuously, monitors app launches, displays overlays and intercepts credentials,” Threatfabric said. “Malware monitors all accessibility events and captures all elements that appear on the screen.”

This allows the malware to record all activity performed by the victim on the screen and trigger a screen capture of the content of the Google Authenticator application.

Cybersecurity

Another feature of Crocodilus is its ability to not only display black screen overlays, but also hide malicious actions on the device, and ensure that the victim is not noticed.

Some of the important features supported by malware are listed below –

Send/select contacts/select self-femo post-push notification SMS messages from the startup device of the specified application

“The emergence of Crocodilus mobile banking Trojans demonstrates the significant escalation of refinement and threat levels brought about by modern malware,” Threatfabric said.

“With advanced device trading capabilities, remote control capabilities, and the deployment of black overlay attacks from the earliest iterations, Crocodilus exhibits a level of maturity that is unusual for newly discovered threats.”

The development comes from what ForcePoint revealed, which was found to have used tax-themed lures to distribute Trojans targeting Windows users in Mexico, Argentina and Spain, targeting Trojans targeting obfuscated visual basic scripts.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFour policemen, two rebels killed in India-controlled Kashmir | News
Next Article Russia-Ukraine War: List of Major Events, Day 1,129 | Military News
user
  • Website

Related Posts

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

July 17, 2025

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

July 17, 2025

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.