New Android Banking Trojan Grows in Tactics and Reach

Share This Post

New Android Banking Trojan: Rising Threats from Crocodilus

A new player in the Android malware landscape is stirring concern, and it’s not for the right reasons.

Crocodilus, a banking Trojan first detected in March by the Mobile Threat Intelligence Team, has quickly transitioned from limited, experimental campaigns to a treacherous global threat. What initially targeted users primarily in Turkey has ballooned into an extensive operation affecting individuals across Europe and South America, armed with increasingly sophisticated tactics.


From Test Campaigns to Targeted Attacks

The Trojan’s initial appearances were characterized by haphazard testing, with experimental samples showing up in brief campaigns. However, over time, it became evident that Crocodilus was not just another basic Android Trojan—it was being actively refined and deployed in a series of coordinated attacks.

Recent findings indicate a marked escalation in its operations. The geographical reach has widened, with new hotspots emerging in Spain, Poland, Brazil, and Argentina, while still maintaining a foothold in Turkey.


Luring Victims with Fake Bonuses and Facebook Ads

One particularly brazen campaign recently targeted Polish users via Facebook Ads. Presenting itself as mobile banking or e-commerce applications, the ads lured users in with promises of bonus points or exclusive rewards, coaxing them to download what appeared to be legitimate applications.

The trap? Clicking the “Download” button led users to a malicious site, delivering the Crocodilus dropper capable of bypassing Android 13+ restrictions. Remarkably, despite the ads being live for only a few hours, each garnered over a thousand views, predominantly from users over 35—indicative of a targeted effort to reach financially stable individuals.


Still Rooted in Turkey, Now Branching Out

Despite its ambitious global intentions, Crocodilus has not forgotten its roots. Turkish users remain a primary target, particularly those engaging with financial or cryptocurrency apps. One tactic included masquerading as an online casino to deceive users into surrendering their banking credentials.

In Spain, Crocodilus has camouflaged itself as a browser update, launching campaigns specifically aimed at nearly all major Spanish banks. Its reach now extends to users in the United States, Indonesia, and India, often pushing deceptive fronts like cryptocurrency mining apps and digital banking services. This evolution clearly signifies that Crocodilus has transformed from a regional nuisance into a global menace.


Under the Hood: Smarter, Stealthier, and More Dangerous

The recent uptick in Crocodilus activity isn’t just about geographical expansion; it also showcases significant technical enhancements that make detection increasingly challenging. The developers have implemented advanced obfuscation techniques, including code packing and XOR encryption, along with convoluted coding structures and runtime loading methods designed to thwart analysts and evade security measures.

But it’s not merely about stealth—the freshness of functionalities makes Crocodilus even more fearsome.


Making New “Friends”: Contact List Infiltration

A particularly unsettling feature allows Crocodilus to insert deceptive contacts directly into an infected user’s device. When activated with a given command, the malware can create a new contact, often named something innocuous like “Bank Support.” This propels attackers into a social engineering advantage, enabling them to make calls to victims from what appears to be a trusted source.

This tactic can skillfully evade fraud alerts, further complicating efforts to combat phishing and vishing attacks.


Seed Phrases in the Crosshairs

Another disturbing trend is Crocodilus’ fixation on cryptocurrency wallets. It now features a seed phrase collector—an upgraded parser that meticulously extracts recovery phrases and private keys directly from screen content.

Utilizing accessibility logging and preprocessing techniques, Crocodilus can effectively siphon off critical data in real-time. This upgrade equips attackers with screenshots and usable information, paving the way for immediate exploitation.


A Global Threat That’s Only Getting Smarter

The combination of a global reach along with increasing technical sophistication makes Crocodilus an alarming concern. This threat profile is not merely opportunistic; it represents a dynamic, adaptable menace, likely supported by an organized operation with significant resources.


Clever, Not Novel

Süleyman Özarslan, co-founder of Picus Security, notes that Crocodilus’ “Bank Support” tactic inserts fake entries into the user’s contacts, making their calls appear credible. While clever, it isn’t entirely innovative. "Previous Android banking groups like FakeCalls and PixPirate have utilized similar methods for vishing and WhatsApp phishing," he remarks.

He further highlights that with personal devices increasingly connected to corporate networks, an infected phone can lead to catastrophic breaches, as employees may unwittingly share multi-factor authentication (MFA) tokens or approve fraudulent requests.

The lesson for enterprises is loud and clear: smartphones should be treated as integral endpoints within corporate networks. Failing to do so could allow a simple malware infection to escalate into a full-blown corporate breach.


In this evolving landscape of cybersecurity threats, staying informed and vigilant remains paramount. As malware like Crocodilus continues to adapt and expand, proactive measures are essential to protect sensitive information and maintain cybersecurity integrity.

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Check all Categories of Articles

Do You Want To Boost Your Business?

drop us a line and keep in touch
franetic-agencia-de-marketing-digital-entre-em-contacto