Technology

Beware! New Crocodilus Malware is Stealing Your Cryptocurrency Wallet Keys!

2025-03-30

Author: Wei Ling

Introduction

A newly discovered Android malware, named Crocodilus, is causing alarm among cryptocurrency enthusiasts as it cunningly tricks users into revealing the seed phrases for their cryptocurrency wallets. The malware employs alarming tactics that warn users to back up their keys to prevent losing access, capitalizing on their fear and urgency.

Capabilities of Crocodilus

This insidious banking malware doesn't just stop at stealing wallet keys; it boasts extensive capabilities to take full control of infected devices, harvest sensitive data, and execute remote commands. Researchers from the fraud prevention group ThreatFabric have uncovered that Crocodilus is distributed through a sophisticated dropper that successfully evades security measures instituted by Android 13 and later versions.

Distribution and Infection

This dropper stealthily installs the malware on devices without triggering Google's Play Protect, cunningly bypassing Accessibility Service restrictions. What sets Crocodilus apart from other malware is its adept use of social engineering to manipulate victims into providing access to their coveted crypto wallet seed phrases.

Social Engineering Tactics

Using a deceptive screen overlay, Crocodilus warns users to “back up their wallet key in the settings within 12 hours” or risk losing access—an ominous prompt that easily sways users into compliance. ThreatFabric notes that this social engineering tactic essentially guides victims to their wallet key, which Crocodilus then captures using its Accessibility Logger.

Impact on Victims

With this vital information in hand, attackers can gain complete control over victims' wallets and drain them completely. In its initial phases, the malware has been observed primarily targeting users in Turkey and Spain, potentially indicating a Turkish origin based on debug messages.

Modes of Infection

The exact method by which users become infected remains unclear, but similar malware typically spreads through deceiving pathways, such as malicious websites, fraudulent social media promotions, SMS messages, and third-party application stores.

Accessibility Service Exploit

Once initiated, Crocodilus gains access to the Accessibility Service, designed to assist users with disabilities, allowing it to access screen content, perform navigation gestures, and monitor active applications.

Command Capabilities

The bot component of this malware can execute a staggering array of commands—23 in total—which include: - Enabling call forwarding - Launching specified applications - Posting push notifications - Sending SMS messages to contacts or designated numbers - Retrieving SMS messages - Requesting Device Admin privileges - Activating a black overlay to obscure its interface - Muting device sounds - Locking the screen - Setting itself as the default SMS manager.

Remote Access Features

Furthermore, Crocodilus incorporates remote access trojan (RAT) functionality, allowing operators to interact seamlessly with the user interface, tapping the screen, navigating apps, and performing swipe gestures as if they were the user. Notably, it has a specific command dedicated to taking screenshots of the Google Authenticator app to capture one-time passwords, which are critical for two-factor authentication security.

Cloaking and Deception Tactics

During these operations, Crocodilus can cloak its activities by activating a black screen overlay and muting the device, tricking victims into believing that their devices are locked and non-functional.

Potential for Expansion

While Crocodilus has so far focused on users in Spain and Turkey, experts caution that its operations could expand to target users in other regions soon, increasing the risk for cryptocurrency traders globally.

Prevention Measures

To protect against such threats, Android users are advised to refrain from downloading APKs from unofficial sources and to ensure that Play Protect is always enabled on their devices. Stay vigilant and safeguard your digital assets—don't fall prey to the schemes of Crocodilus!