Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Android Malware "Crocodilus" Steals Crypto Wallet Keys via Social Engineering




A new Android malware has been discovered by researchers at ThreatFabric, which tricks users into providing their seed phrase for cryptocurrency wallets via social engineering tactics. With its sophisticated capabilities and ability to gain full control over devices, Crocodilus presents a significant threat to Android users worldwide. Learn more about this emerging threat in our detailed analysis of the new malware.



  • A new Android malware called Crocodilus has been discovered by researchers at ThreatFabric, designed to trick users into providing cryptocurrency wallet seed phrases.
  • Crocodilus uses social engineering tactics to disguise itself as a legitimate warning message and prompt users to enter their seed phrase.
  • The malware gains access to Accessibility Services to unlock screen content and perform navigation gestures, allowing it to intercept account credentials.
  • Crocodilus features remote access trojan functionality, enabling its operators to control the device and drain accounts completely.
  • The malware also includes a black screen overlay that can be activated to hide activity and make it difficult for victims to detect malicious activity.
  • Initial infections are believed to occur through tricking users into downloading droppers from malicious sites, fake promotions on social media, or SMS, and third-party app stores.



  • A new and highly sophisticated Android malware, dubbed Crocodilus, has recently been discovered by researchers at ThreatFabric. This malicious software is designed to trick unsuspecting users into providing the seed phrase for their cryptocurrency wallet, thereby allowing attackers to gain full control over the device and drain the victim's accounts completely.

    According to the threat researchers, Crocodilus uses a sophisticated social engineering tactic to achieve its nefarious goals. The malware disguises itself as a legitimate warning message that prompts users to "back up their wallet key in the settings within 12 hours" or risk losing access to their wallet. This ruse is designed to deceive users into navigating to their seed phrase, where it can be harvested by the attackers.

    Once inside the device, Crocodilus gains access to Accessibility Service, normally reserved for aiding people with disabilities, to unlock access to screen content and perform navigation gestures. The malware then loads a fake overlay on top of the real app to intercept the victim's account credentials, allowing it to gain unauthorized access to the user's cryptocurrency wallet.

    With its seed phrase in hand, attackers can now fully control the device and drain the victim's accounts completely. Crocodilus also features a range of other malicious capabilities, including remote access trojan functionality, which enables its operators to tap on the screen, navigate the user interface, perform swipe gestures, and capture one-time password codes used for two-factor authentication account protection.

    Furthermore, the malware offers a black screen overlay that can be activated by its operators to hide the activity from the victim and make it appear as if the device is locked. This ability makes it even more difficult for the victim to detect the malicious activity unfolding on their device.

    The first operations of Crocodilus were observed targeting users in Turkey and Spain, including bank accounts from those two countries. Judging from the debug messages, it appears that the malware is of Turkish origin.

    It is unclear how the initial infection occurs, but typically, victims are tricked into downloading droppers through malicious sites, fake promotions on social media or SMS, and third-party app stores.

    Android users are advised to exercise extreme caution and take necessary precautions to protect themselves from this new threat. This includes avoiding the download of APKs from outside Google Play and ensuring that Play Protect is always active on their devices.

    Moreover, users should be aware of the signs of a potential attack by malicious software, such as unusual behavior on their device, unauthorized apps being installed without their knowledge or consent, and unexpected pop-ups or alerts. If any of these symptoms are observed, it is crucial to act swiftly and take immediate action to protect one's device.

    In conclusion, Crocodilus presents a significant threat to Android users worldwide. Its sophisticated social engineering tactics make it all the more difficult for users to detect and prevent infections. Therefore, it is imperative that users remain vigilant and adhere to best practices when using their devices to minimize the risk of falling prey to this malicious software.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/New-Android-Malware-Crocodilus-Steals-Crypto-Wallet-Keys-via-Social-Engineering-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/new-crocodilus-malware-steals-android-users-crypto-wallet-keys/

  • https://www.crowdstrike.com/en-us/blog/who-is-fancy-bear/

  • https://www.infosecinstitute.com/resources/threat-intelligence/apt28-cybercrime-or-state-sponsored-hacking/


  • Published: Sun Mar 30 09:53:17 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us