• Cyber Syrup
  • Posts
  • Crocodilus Android Trojan Expands Globally with Enhanced Features

Crocodilus Android Trojan Expands Globally with Enhanced Features

A recently discovered Android banking trojan, dubbed Crocodilus, is rapidly expanding its reach, now targeting users in Europe, South America, and beyond

In partnership with

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

Try Artisan’s All-in-one Outbound Sales Platform & AI BDR

Ava automates your entire outbound demand generation so you can get leads delivered to your inbox on autopilot. She operates within the Artisan platform, which consolidates every tool you need for outbound:

  • 300M+ High-Quality B2B Prospects, including E-Commerce and Local Business Leads

  • Automated Lead Enrichment With 10+ Data Sources

  • Full Email Deliverability Management

  • Multi-Channel Outreach Across Email & LinkedIn

  • Human-Level Personalization

Crocodilus Android Trojan Expands Globally with Enhanced Features

A recently discovered Android banking trojan, dubbed Crocodilus, is rapidly expanding its reach, now targeting users in Europe, South America, and beyond. Originally confined to Spain and Turkey, the malware has evolved significantly, both in technical sophistication and geographic scope, according to a new report from ThreatFabric, a Dutch cybersecurity company specializing in mobile threat intelligence.

Key Findings

  • Crocodilus is being distributed through social engineering, often disguised as legitimate apps or updates.

  • The malware now includes advanced obfuscation techniques, making it harder to detect or analyze.

  • It is capable of:

    • Harvesting banking credentials via overlay attacks

    • Capturing cryptocurrency wallet seed phrases

    • Adding new contacts to the victim’s device for potential scam impersonation

Initial Discovery and Evolution

Crocodilus was first observed in March 2025, targeting Android users in Spain and Turkey by posing as well-known apps such as Google Chrome. The malware abuses Android Accessibility Services to:

  • Record user input

  • Monitor on-screen activity

  • Capture sensitive information such as banking credentials and cryptocurrency wallet seed phrases

Overlay attacks are employed to present fake login screens over legitimate banking apps, tricking users into entering their usernames and passwords.

Expanded Geographic Targeting

According to ThreatFabric, Crocodilus has broadened its target list to include countries such as:

  • Poland

  • Argentina

  • Brazil

  • India

  • Indonesia

  • The United States

Distribution Techniques

In Poland, bogus Facebook ads are used to lure users into downloading fake banking or e-commerce apps. These ads redirect victims to malicious websites hosting the Crocodilus dropper, which installs the trojan on their devices.

Other campaigns targeting Spain and Turkey have employed fake browser updates and fraudulent online casinos as cover.

New Technical Capabilities

1. Contact Insertion Feature

Crocodilus can now add contacts to the victim's contact list upon receiving a command labeled "TRU9MMRHBCRO". This functionality is believed to be a workaround for Google's scam warnings during screen-sharing sessions with unknown numbers.

“The intent is to add a phone number under a convincing name such as ‘Bank Support,’ allowing the attacker to call the victim while appearing legitimate,” said ThreatFabric.

This tactic could also evade fraud detection systems that flag interactions with unfamiliar phone numbers.

2. Automated Seed Phrase Collector

A newly integrated parser enables the malware to automatically extract seed phrases and private keys from cryptocurrency wallets. This could allow attackers to drain virtual assets with minimal user interaction.

Advanced Obfuscation

To make analysis more difficult, the trojan now includes layered obfuscation. These techniques are designed to:

  • Prevent detection by mobile security software

  • Hinder reverse engineering by security researchers

This makes it more difficult for cybersecurity teams to develop reliable signatures and behavioral rules to detect and block the malware.

Global Threat Outlook

Crocodilus represents a significant step in the evolution of mobile banking malware. What began as a regional threat has quickly become a global concern due to its:

  • Modular architecture

  • Scalable delivery methods

  • Steady stream of feature updates

“The latest campaigns involving the Crocodilus Android banking Trojan signal a concerning evolution in both the malware's technical sophistication and its operational scope,” ThreatFabric noted.

Mitigation and User Advice

To protect against Crocodilus and similar mobile threats:

  • Only download apps from official app stores (e.g., Google Play)

  • Avoid clicking on links in unsolicited messages or ads

  • Review app permissions carefully—especially requests for accessibility services

  • Use reputable mobile security software

  • Stay updated on emerging threats from verified security sources

As cybercriminals continue to exploit mobile ecosystems, understanding these evolving tactics is key to defending against them. Crocodilus is a clear indicator that banking malware is becoming more deceptive, persistent, and globally distributed than ever before.