headphones
New Malware Targeting Banks and Crypto Platforms With Remote Control and Black Screen Overlays Spreads: Report
链上信仰者
链上信仰者
authIcon
区块链先知
04-03 04:01
Follow
Focus
A new strain of malware has been targeting mobile banking apps and crypto wallets on Android phones. The fraud prevention firm ThreatFabric says the new malware, which it named "Crocodilus," is a trojan that utilizes remote control, black screen overlays and advanced data harvesting.
Helpful
Not Helpful
Play

A new strain of malware has been targeting mobile banking apps and crypto wallets on Android phones.

The fraud prevention firm ThreatFabric says the new malware, which it named “Crocodilus,” is a trojan that utilizes remote control, black screen overlays and advanced data harvesting.

Crocodilus uses dropper malware, which is designed to bypass Android restrictions, to access victims’ systems. After it’s installed, the trojan requests the victim to enable Accessibility Service.

Source: ThreatFabric

The malware then uses overlays, which run deceptive applications on top of victims’ actual apps to trick them into divulging their credentials.

Explains ThreatFabric,

“Initial campaigns observed by our Mobile Threat Intelligence team show targets primarily in Spain and Turkey, along with several cryptocurrency wallets. We expect this scope to broaden globally as the malware evolves.

Another data theft feature of Crocodilus is a keylogger. However, it is more accurate to call it an Accessibility Logger – the malware monitors all Accessibility events and captures all the elements displayed on the screen. In this way, it effectively logs all text changes performed by a victim, making it a keylogger, but the capabilities go beyond just keylogging.”

The fraud prevention firm notes that when victims submit their PINs or passwords to Crocodilus’s crypto wallet overlays, the malware will display a message saying,

“Back up your wallet key in the settings within 12 hours. Otherwise, the app will be reset, and you may lose access to your wallet.”

The message is designed to convince victims to navigate to their seed phrases, which the malware then steals with its accessibility logger.

Follow us on X, Facebook and Telegram

Don't Miss a Beat – Subscribe to get email alerts delivered directly to your inbox

Check Price Action

Surf The Daily Hodl Mix

Generated Image: Midjourney

Open the app to read the full article
DisclaimerAll content on this website, hyperlinks, related applications, forums, blog media accounts, and other platforms published by users are sourced from third-party platforms and platform users. BiJieWang makes no warranties of any kind regarding the website and its content. All blockchain-related data and other content on the website are for user learning and research purposes only, and do not constitute investment, legal, or any other professional advice. Any content published by BiJieWang users or other third-party platforms is the sole responsibility of the individual, and has nothing to do with BiJieWang. BiJieWang is not responsible for any losses arising from the use of information on this website. You should use the related data and content with caution and bear all risks associated with it. We strongly recommend that you independently research, review, analyze, and verify the content.
Comments(0)

No comments yet

edit
comment
collection
like
share