Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Watch Out for This Scary New Malware: Crocodilus

Watch Out for This Scary New Malware: Crocodilus

Mobile malware doesn’t get talked about a lot, and that’s because it’s relatively uncommon compared to others, but it’s still just as dangerous. Crocodilus, a new Trojan on the Android platform, is one such example. Today, we want to cover how you can address this new variant and avoid contact with it.

Crocodilus was first identified early in 2025, and it’s not just a data thief; it’s a comprehensive remote access Trojan (RAT). It can take over infected devices and steal sensitive financial information, especially banking credentials and cryptocurrency assets.

Luring in Unsuspecting Prey

Crocodilus is a threat used in conjunction with various social engineering tactics to lure in prey and strike. Its influence ranges from Turkey and Spain, all the way to Europe, South America, the United States, and parts of Asia.

Crocodilus spreads by malicious advertisements on social media platforms like Facebook. These ads might look like legitimate banking or e-commerce applications, and they might even offer special bonuses or time-sensitive offers. Once the user clicks on the ad, though, they are redirected to a malicious website that downloads Crocodilus. It bypasses all the security restrictions in place on newer Android versions—the ones intended to prevent the sideloading of malicious applications.

How Crocodilus Works

Crocodilus leverages Android’s Accessibility Services—services designed to assist users with disabilities while interacting with the device. It’s a despicable use of well-intentioned tools. Here’s what Crocodilus can do:

  • Overlay attacks - The malware can show fake login screens over legitimate banking and cryptocurrency apps, leading to users willingly giving away login credentials right to attackers.
  • Keylogging - Crocodilus records keystrokes and records everything… passwords, PINs, and private messages included.
  • Remote device takeover - This malware allows criminals to control the infected device, including navigating through apps, making transactions, and transferring funds.
  • Data theft - Crocodilus can steal information like contact lists, SMS messages, and data from other applications.
  • Cryptocurrency wallet theft - Crocodilus can steal the seed phrases used in cryptocurrency wallets through social engineering prompts like fake security backup alerts, all to get the user to share their recovery keys.
  • Encrypting its own code - Crocodilus is changing as time goes on, and a new variant called Pragma includes native code that encrypts its malicious payload, making it harder to detect and analyze.

Crocodilus is Rapidly Evolving

The hackers behind Crocodilus are continuously making efforts to upgrade and refine the malware, which has led to its rapid evolution in a short period of time. New features are constantly being added to make it more effective and dangerous, including one which allows the malware to add fake contacts to a victim’s contact list. This could make malicious calls look like they’re coming from a legitimate source and establish trust that should absolutely not be granted.

How to Protect Yourself from Crocodilus

There are ways to take the fight to Crocodilus, and they’re not terribly complicated ones. First, make sure you're not installing apps from unofficial sources; download from the Google Play Store and other trusted app storefronts. You should also be wary of any permissions you give to your apps, especially those that are requesting access to Accessibility Services. If the app doesn’t need access to services to work, but requests them anyway, consider it a red flag. Finally, make sure you update your Android operating system to the latest version, complete with the latest security patches and updates.

Worried about the latest digital threats? Voyage Technology can help. To learn more, call us at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Business Management VoIP Smartphones communications Upgrade Mobile Devices Data Recovery Disaster Recovery Productivity Windows Browser Social Media Managed IT Services Microsoft Office AI Current Events Tech Term Remote Network Internet of Things Artificial Intelligence Facebook Automation Covid-19 Cloud Computing Gadgets Holiday Server Managed Service Provider Remote Work Information Miscellaneous Training Outsourced IT Compliance Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi IT Support Windows 10 Bandwidth Blockchain Virtualization Business Technology Two-factor Authentication Mobile Office Data Security Vendor Apps Mobile Device Management Networking Chrome Gmail Budget Apple BYOD App Employer-Employee Relationship Managed Services Voice over Internet Protocol Computing Hacker Tip of the week Information Technology Avoiding Downtime Conferencing Marketing Office 365 How To BDR WiFi HIPAA Applications Access Control Computers Risk Management Retail Website Analytics Office Tips Managed IT Services Augmented Reality Storage Password Bring Your Own Device Big Data Router 2FA Virtual Private Network Health Operating System Help Desk Healthcare Document Management Free Resource Project Management Windows 7 Telephone Scam Data loss Microsoft 365 Firewall Cooperation Solutions Patch Management Save Money The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Windows 11 Social Physical Security Display Excel Printer Going Green Paperless Office Remote Workers Infrastructure Customer Service Monitoring Cybercrime YouTube iPhone Presentation Machine Learning Saving Time Cryptocurrency Vulnerabilities Wireless Technology Data Privacy Managed IT Service Virtual Desktop Images 101 Maintenance Data storage Downloads LiFi Antivirus Multi-Factor Authentication Mobility Word Licensing Outlook Entertainment Money Humor Employees Integration Safety Robot Telephone System Sports Cost Management Mouse Holidays Administration IT Management Meetings VPN Data Storage Supply Chain Video Conferencing Modem Managed Services Provider User Tip Processor Virtual Machines Computer Repair Mobile Security Professional Services Customer Relationship Management Settings Wireless Printing Content Filtering Smart Technology Hacking SharePoint Smartwatch Addiction IT Electronic Medical Records Language Scams Chatbots Azure Hybrid Work Google Drive User Knowledge Management Procurement Lenovo Telework Screen Reader Cyber security Writing Distributed Denial of Service Tech Human Resources CES 5G Service Level Agreement Communitications Virtual Reality Computing Infrastructure Cables Private Cloud Identity IP Address Google Docs Unified Communications Experience Server Management Supply Chain Management Superfish Bookmark FinTech Identity Theft Smart Tech Term Google Apps Bitcoin Running Cable Download IT Assessment Twitter Alerts IT Maintenance Google Wallet Error Value Business Intelligence Recovery Flexibility Browsers Organization Connectivity Social Engineering Break Fix Shortcuts Hard Drives Windows 8 Laptop Digital Security Cameras Upload Smart Devices Remote Computing Ransmoware Domains Drones Memory Vendors Multi-Factor Security Social Network Remote Working Tablet IoT Data Breach Dark Web Google Play Be Proactive Refrigeration Halloween Videos Trends Electronic Health Records Alert Workforce Public Speaking File Sharing Regulations Wasting Time Threats Lithium-ion battery Dark Data Google Calendar Managed IT Customer Resource management Scary Stories Data Analysis Star Wars Trend Micro How To Microsoft Excel Security Cameras Workplace Strategies Hacks Entrepreneur Fun Gamification Software as a Service Notifications Staff Meta Travel Social Networking Managing Costs Amazon Legislation Deep Learning Techology Fileless Malware Google Maps eCommerce SSID Undo Education Content Surveillance Wearable Technology Virtual Assistant Outsource IT Unified Threat Management Motherboard Virtual Machine Environment Comparison Media Health IT Unified Threat Management Directions Reviews Assessment Permissions Medical IT Mobile Computing Search Development Transportation Small Businesses Hypervisor Displays Network Congestion Specifications Application Best Practice Buisness User Error Microchip Shopping Internet Exlporer Optimization Fraud PowerPoint IBM Legal IT solutions Username Employer/Employee Relationships Outsourcing PCI DSS Point of Sale Black Friday Navigation Business Growth Gig Economy Database Workplace Teamwork Hiring/Firing Cortana Network Management Internet Service Provider Tech Support IT Technicians Proxy Server Regulations Compliance Cookies Monitors Cyber Monday Evernote Paperless Alt Codes Downtime Tactics Memes Hotspot Co-managed IT Competition Websites Mirgation SQL Server Technology Care Hosted Solution Net Neutrality Financial Data Nanotechnology History Business Communications Typing

Blog Archive