Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • ‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft
  • Security Week

‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft

Ionut Arghire March 31, 2025
0

A newly identified mobile banking trojan targeting Android users has advanced device takeover capabilities and remote-control functionality, fraud prevention firm ThreatFabric warns.

Dubbed Crocodilus, the trojan contains powerful capabilities, including remote control of the infected device, advanced data harvesting, keylogging, and support for overlay attacks. It has been observed targeting users in Spain and Turkey.

The malware is installed using a proprietary dropper that can bypass restrictions implemented in Android 13 and newer platform iterations, and requests Accessibility Services permissions, which allow it to take over the infected device.

After obtaining the necessary permissions, the threat connects to its command-and-control (C&C) server, which provides it with instructions regarding the targeted applications and overlays to be used.

Crocodilus runs continuously in the background, monitoring the launched applications and displaying overlays to steal the victim’s credentials.

The malware performs keylogging by monitoring all accessibility events to capture elements displayed on the screen, which allows it to log all text modifications made by the user. This also allows it to capture the screen when Google Authenticator is active.

“Crocodilus will enumerate all the elements displayed on the screen in Google Authenticator app, capture the text displayed (the name of the OTP code, as well as its value) and send these to the C&C, allowing timely theft of OTP codes for the operators,” ThreatFabric explains.

Courtesy of built-in remote access capabilities, the trojan allows operators to use stolen credentials and other information to take full control of the infected device and perform fraudulent transactions on the victim’s behalf.

Advertisement. Scroll to continue reading.

According to ThreatFabric, the malware can display a black screen overlay and mute the sound to hide its malicious activities.

When detecting interaction with a cryptocurrency wallet, after harvesting the password/PIN, the malware displays a message urging the victim to back up their wallet key. This social engineering trick enables the malware’s operators to harvest the wallet key and drain the funds.

Crocodilus, ThreatFabric says, is likely operated by a threat actor named ‘sybra’, which was previously associated with the MetaDroid (a variant of Ermac), Hook, and Octo Android malware.

However, it appears to have been created by a different threat actor, likely a Turkish-speaking developer, based on debug messages found in the code.

Related: North Korean Hackers Distributed Android Spyware via Google Play

Related: BadBox Botnet Powered by 1 Million Android Devices Disrupted

Related: 1,000 Apps Used in Malicious Campaign Targeting Android Users in India

Related: FireScam Android Malware Packs Infostealer, Spyware Capabilities

About The Author

Ionut Arghire

See author's posts

Original post here

Continue Reading

Previous: CISA Analyzes Malware Used in Ivanti Zero-Day Attacks
Next: 5 Impactful AWS Vulnerabilities You’re Responsible For

Trending Now

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices mm.jpg 1

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

May 23, 2025
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 2

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 3

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 4

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 5

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 6

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices mm.jpg 1
  • The Hacker News

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

May 23, 2025
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 2
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 3
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 4
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 5
  • The Hacker News

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 6
  • The Hacker News

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 7
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025

You may have missed

mm.jpg
  • The Hacker News

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

[email protected] The Hacker News May 23, 2025 0
ransomware.jpg
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

[email protected] The Hacker News May 23, 2025 0
safeline.jpg
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

[email protected] The Hacker News May 23, 2025 0
botnet.jpg
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

[email protected] The Hacker News May 23, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.