A sophisticated new Android banking Trojan, dubbed Crocodilus, has emerged on the global threat landscape, rapidly evolving its features and evasion techniques as it sweeps across Europe, South America, and beyond.
Initially spotted by Mobile Threat Intelligence (MTI) researchers in March 2025, Crocodilus has already unleashed a series of technically advanced campaigns targeting financial and cryptocurrency assets while gaining nearly unrestricted control over infected devices.
The first Crocodilus samples surfaced in Turkish financial apps, but recent campaigns reveal an aggressive expansion. The Trojan is now targeting users in Poland, Spain, and countries in South America, with smaller campaigns spotted in Argentina, Brazil, the US, Indonesia, and India.
One of the most notable distribution techniques leverages malicious advertisements on social networks, including Facebook Ads.
These ads, often mimicking legitimate banking or e-commerce applications, lure victims with promises of bonus points or rewards, then redirect them to sites hosting the Crocodilus dropper.
The dropper is engineered to bypass Android 13+ security restrictions, ensuring successful installation even on the latest devices.
According to Facebook’s ad transparency reports, each malicious ad was displayed over a thousand times in just a couple of hours, primarily to users over the age of 35—a demographic perceived as more financially solvent.
What sets Crocodilus apart is its relentless innovation in both its delivery mechanisms and internal architecture. Recent variants feature improved code obfuscation, including:
Here is a simplified pseudocode illustrating the XOR payload decryption technique:
pythondef xor_decrypt(data, key):
return bytes([b ^ key for b in data])
# Example usage with encrypted_payload and key
decrypted_payload = xor_decrypt(encrypted_payload, 0x5A)
Crocodilus has introduced multiple features granting attackers unprecedented control over compromised devices:
"TRU9MMRHBCRO", the malware can add new contacts to the victim’s device—often under names like “Bank Support.” This enables convincing social engineering calls that bypass fraud detection measures.pythonimport re
wallet_display = "Your recovery phrase: word1 word2 ... word12"
seed_re = re.compile(r'recovery phrase: ([a-z ]+)')
match = seed_re.search(wallet_display)
if match:
seed_phrase = match.group(1)
This client-side extraction delivers high-quality, preprocessed data to cybercriminals, supporting rapid account takeover and theft of crypto assets.
Crocodilus represents a major leap in Android banking malware, fusing advanced obfuscation, global malvertising, and powerful device control features.
Its capacity to not only steal credentials but also manipulate device contacts potentially for follow-up voice phishing marks a troubling evolution.
Security teams and everyday users are urged to remain vigilant: only install apps from trusted sources, scrutinize permissions, and update device software regularly to mitigate the mounting risks posed by Crocodilus and its future variants.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…