• CONTACT
  • MARKETCAP
  • BLOG
Crypto NEWS
  • BOOKMARKS
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • About CryptoNewsUpdate.com
Reading: Crocodilus Android Trojan Adds Crypto Wallet Heist Tools in Global Expansion
Share

Crypto NEWS

0
Font ResizerAa
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
Search
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • About CryptoNewsUpdate.com
Have an existing account? Sign In
Follow US
© Crypto NEWS Update. All Rights Reserved.
Crypto NEWS > Blog > Crypto News > Crocodilus Android Trojan Adds Crypto Wallet Heist Tools in Global Expansion
Crypto News

Crocodilus Android Trojan Adds Crypto Wallet Heist Tools in Global Expansion

yangzeph4@gmail.com
Last updated: June 3, 2025 1:13 pm
yangzeph4@gmail.com Published June 3, 2025
Share

Android banking trojan Crocodilus has launched new campaigns targeting crypto users and banking customers across Europe and South America.

First detected in March 2025, early Crocodilus samples were largely limited to Turkey, where the malware posed as online casino apps or spoofed bank apps to steal login credentials.

However, recent campaigns show the Trojan expanding its reach, now hitting targets in Poland, Spain, Argentina, Brazil, Indonesia, India and the US, according to new findings from ThreatFabric’s Mobile Threat Intelligence (MTI) team.

A campaign targeting Polish users tapped Facebook Ads to promote fake loyalty apps. Clicking the ad redirected users to malicious sites, delivering a Crocodilus dropper, which bypasses Android 13+ restrictions.

Facebook transparency data revealed that these ads reached thousands of users in just one to two hours, with a focus on audiences over 35.

Crocodilus malware is going global. Source: ThreatFabric

Related: Microsoft takes legal action against infostealer Lumma

Crocodilus targets banking and crypto apps

Once installed, Crocodilus overlays fake login pages on top of legitimate banking and crypto apps. It masquerades as a browser update in Spain, targeting nearly all major banks.

Beyond geographic expansion, Crocodilus has added new capabilities. One notable upgrade is the ability to modify infected devices’ contact lists, enabling attackers to insert phone numbers labeled as “Bank Support,” which could be used for social engineering attacks.

Another key enhancement is an automated seed phrase collector aimed at cryptocurrency wallets. The Crocodilus malware can now extract seed phrases and private keys with greater precision, feeding attackers pre-processed data for fast account takeovers.

Meanwhile, developers have strengthened Crocodilus’ defenses through deeper obfuscation. The latest variant features packed code, additional XOR encryption, and intentionally convoluted logic to resist reverse engineering.

MTI analysts also observed smaller campaigns targeting cryptocurrency mining apps and European digital banks amid Crocodilus’ growing focus on crypto.

“Just like its predecessor, the new variant of Crocodilus pays a lot of attention to cryptocurrency wallet apps,” the report said. “This variant was equipped with an additional parser, helping to extract seed phrases and private keys of specific wallets.”

Source: ThreatFabric

Related: COLDRIVER using new malware to steal from Western targets — Google

Crypto drainers sold as malware

In an April 22 report, crypto forensics and compliance firm AMLBot revealed that crypto drainers, malware designed to steal cryptocurrency, have become easier to access as the ecosystem evolves into a software-as-a-service business model.

The report revealed that malware spreaders can rent a drainer for as little as 100 to 300 USDt (USDT).

On May 19, it was revealed that Chinese printer manufacturer Procolored distributed Bitcoin-stealing malware alongside its official drivers. The company reportedly used USB drivers to distribute malware-ridden drivers and uploaded the compromised software to cloud storage for global download.

Magazine: Move to Portugal to become a crypto digital nomad — Everybody else is

You Might Also Like

Bitcoin Price Could Be Headed For A Surprise Move

Polymarket Gives US Stablecoin Bill 89% Chance Of Becoming Law

Bitcoin Faces Tight Daily Squeeze – Volatility Incoming Amid Geopolitical Risks

Ripple-Backed ETF Launches In Canada

Trump-Tied Company Reduced Its Stake In World Liberty Financial By 20%

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Copy Link Print
Previous Article Quantivision Business Institute (QBI) Announces Collaboration with Major Exchanges for Global Launch of MindArc 5.0 on September 1, 2025
Next Article Crocodilus Android Trojan Adds Crypto Wallet Heist Tools in Global Expansion
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow US

Find US on Socials

Subscribe to our newslettern

Get Newest Articles Instantly!

Popular News
Visa Partners With Yellow Card to Roll Out Stablecoin Payments in Africa
Blocktech Brew Join Hands With Qila To Promote Web3 Services Across Industries!
$150M money market funds added to Arbitrum’s RWA ecosystem

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Youtube Telegram Linkedin
Crypto NEWS

We influence 20 million users and is the number one business blockchain and crypto news network on the planet.

Subscribe to our newsletter

You can be the first to find out the latest news and tips about trading, markets...

Ad image
© Crypto NEWS Update. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?