Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Watch Out for This Scary New Malware: Crocodilus

Watch Out for This Scary New Malware: Crocodilus

Mobile malware doesn’t get talked about a lot, and that’s because it’s relatively uncommon compared to others, but it’s still just as dangerous. Crocodilus, a new Trojan on the Android platform, is one such example. Today, we want to cover how you can address this new variant and avoid contact with it.

Crocodilus was first identified early in 2025, and it’s not just a data thief; it’s a comprehensive remote access Trojan (RAT). It can take over infected devices and steal sensitive financial information, especially banking credentials and cryptocurrency assets.

Luring in Unsuspecting Prey

Crocodilus is a threat used in conjunction with various social engineering tactics to lure in prey and strike. Its influence ranges from Turkey and Spain, all the way to Europe, South America, the United States, and parts of Asia.

Crocodilus spreads by malicious advertisements on social media platforms like Facebook. These ads might look like legitimate banking or e-commerce applications, and they might even offer special bonuses or time-sensitive offers. Once the user clicks on the ad, though, they are redirected to a malicious website that downloads Crocodilus. It bypasses all the security restrictions in place on newer Android versions—the ones intended to prevent the sideloading of malicious applications.

How Crocodilus Works

Crocodilus leverages Android’s Accessibility Services—services designed to assist users with disabilities while interacting with the device. It’s a despicable use of well-intentioned tools. Here’s what Crocodilus can do:

  • Overlay attacks - The malware can show fake login screens over legitimate banking and cryptocurrency apps, leading to users willingly giving away login credentials right to attackers.
  • Keylogging - Crocodilus records keystrokes and records everything… passwords, PINs, and private messages included.
  • Remote device takeover - This malware allows criminals to control the infected device, including navigating through apps, making transactions, and transferring funds.
  • Data theft - Crocodilus can steal information like contact lists, SMS messages, and data from other applications.
  • Cryptocurrency wallet theft - Crocodilus can steal the seed phrases used in cryptocurrency wallets through social engineering prompts like fake security backup alerts, all to get the user to share their recovery keys.
  • Encrypting its own code - Crocodilus is changing as time goes on, and a new variant called Pragma includes native code that encrypts its malicious payload, making it harder to detect and analyze.

Crocodilus is Rapidly Evolving

The hackers behind Crocodilus are continuously making efforts to upgrade and refine the malware, which has led to its rapid evolution in a short period of time. New features are constantly being added to make it more effective and dangerous, including one which allows the malware to add fake contacts to a victim’s contact list. This could make malicious calls look like they’re coming from a legitimate source and establish trust that should absolutely not be granted.

How to Protect Yourself from Crocodilus

There are ways to take the fight to Crocodilus, and they’re not terribly complicated ones. First, make sure you're not installing apps from unofficial sources; download from the Google Play Store and other trusted app storefronts. You should also be wary of any permissions you give to your apps, especially those that are requesting access to Accessibility Services. If the app doesn’t need access to services to work, but requests them anyway, consider it a red flag. Finally, make sure you update your Android operating system to the latest version, complete with the latest security patches and updates.

Worried about the latest digital threats? Voyage Technology can help. To learn more, call us at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Voice over Internet Protocol Managed IT Services How To BDR Computing Physical Security HIPAA Hacker Information Technology Applications Avoiding Downtime Access Control Marketing Office 365 Conferencing Healthcare Big Data Operating System Computers Risk Management Virtual Private Network Router Health Website Analytics Office Tips Augmented Reality 2FA Help Desk Retail Storage Password Bring Your Own Device The Internet of Things Telephone Social Cooperation Free Resource Going Green Patch Management Save Money Project Management Windows 7 Remote Monitoring End of Support Vulnerability Vendor Management Microsoft 365 Cybercrime Customer Service Solutions Display Printer Paperless Office Infrastructure Windows 11 Document Management Monitoring Firewall Excel Scam Data loss Remote Workers Managed IT Service Administration Downloads iPhone Licensing Vulnerabilities Entertainment Robot Data Privacy Images 101 Settings Wireless Customer Relationship Management Printing Telephone System Content Filtering Multi-Factor Authentication Mobility IT Management Cost Management YouTube Meetings VPN Hacking Presentation Cryptocurrency Employees Computer Repair Integration Wireless Technology Virtual Desktop Data storage LiFi User Tip Modem Mobile Security Processor Outlook Holidays Word Machine Learning Data Storage Money Humor Smart Technology Supply Chain Video Conferencing Managed Services Provider Maintenance Saving Time Virtual Machines Professional Services Antivirus Sports Safety Mouse Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Tablet Financial Data Search History Business Communications Best Practice Browsers Smartwatch Alert Connectivity IT Break Fix Scams Buisness File Sharing Upload Procurement Dark Data Azure Hybrid Work Managed IT Legal IT solutions Social Network Telework How To Cyber security Multi-Factor Security Tech Human Resources Application Dark Web Cables Business Growth CES Notifications IoT Communitications Travel Trends Supply Chain Management IBM Techology Google Maps Customer Resource management FinTech Cortana Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Alt Codes Data Analysis Star Wars IT Assessment Downtime Unified Threat Management Gamification Flexibility Staff Value Business Intelligence Unified Threat Management Hosted Solution Organization Social Networking Legislation Shortcuts Ransmoware Competition Typing Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Network Congestion Wearable Technology Memory Vendors Google Drive User Error Health IT Knowledge Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Directions Videos Assessment Electronic Health Records Point of Sale 5G Wasting Time Threats User Google Docs Unified Communications Experience Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Bitcoin Network Management Microchip Running Cable Tech Support Internet Exlporer Software as a Service Username Monitors Managing Costs Amazon IP Address Google Wallet eCommerce Black Friday SSID Virtual Assistant Outsource IT Windows 8 Laptop Websites Database Surveillance IT Technicians Virtual Machine Environment Media Recovery Drones Hard Drives SharePoint Proxy Server Reviews Electronic Medical Records Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Domains Halloween Tactics Development Writing Mirgation Hypervisor Displays Lenovo Refrigeration Shopping Virtual Reality Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Public Speaking Hacks Server Management Scary Stories Private Cloud Addiction Identity Theft Management PCI DSS Fun Chatbots Lithium-ion battery Navigation Superfish Entrepreneur Deep Learning Gig Economy Twitter Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Error Service Level Agreement Internet Service Provider Education Regulations Compliance Social Engineering Identity Evernote Paperless Undo Bookmark Remote Computing Smart Tech Memes Co-managed IT

Blog Archive