Original Article Text

Click to Toggle View

New Crocodilus malware steals Android users’ crypto wallet keys. A newly discovered Android malware dubbed Crocodilus tricks users into providing the seed phrase for the cryptocurrency wallet using a warning to back up the key to avoid losing access. Although Crocodilus is a new banking malware, it features fully developed capabilities to take control of the device, harvest data, and remote control. Researchers at fraud prevention company ThreatFabric say that the malware is distributed via a proprietary dropper that bypasses Android 13 (and later) security protections. The dropper installs the malware without triggering Play Protect while also bypassing Accessibility Service restrictions. What makes Crocodilus special is that it integrates social engineering to make victims provide access to their crypto-wallet seed phrase. It achieves this through a screen overlay warning users to “back up their wallet key in the settings within 12 hours” or risk losing access to their wallet. “This social engineering trick guides the victim to navigate to their seed phrase (wallet key), allowing Crocodilus to harvest the text using its Accessibility Logger,” ThreatFabric explains. “With this information, attackers can seize full control of the wallet and drain it completely,” the researchers say. In its first operations, Crocodilus was observed targeting users in Turkey and Spain, including bank accounts from those two countries. Judging from the debug messages, it appears that the malware is of Turkish origin. It is unclear how the initial infection occurs, but typically, victims are tricked into downloading droppers through malicious sites, fake promotions on social media or SMS, and third-party app stores. When launched, Crocodilus gains access to Accessibility Service, normally reserved for aiding people with disabilities, to unlock access to screen content, perform navigation gestures, and monitor for app launches. When the victim opens a targeted banking or cryptocurrency app, Crocodilus loads a fake overlay on top of the real app to intercept the victim’s account credentials. The bot component of the malware supports a set of 23 commands that it can execute on the device, including: The malware also offers remote access trojan (RAT) functionality, which enables its operators to tap on the screen, navigate the user interface, perform swipe gestures, and more. There’s also a dedicated RAT command to take a screenshot of the Google Authenticator application and capture one-time password codes used for two-factor authentication account protection. While executing these actions, Crocodilus operators can activate a black screen overlay and mute the device to hide the activity from the victim and make it appear as if the device is locked. Although Crocodilus appears to have a specific targeting limited to Spain and Turkey right now, the malware could expand operations soon, adding more apps to its target list. Android users are advised to avoid downloading APKs from outside Google Play and to ensure that Play Protect is always active on their devices. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Crocodilus Malware Targets Android Crypto Wallets and Banks

Crocodilus is a newly identified Android malware that intercepts cryptocurrency wallet keys using sophisticated social engineering.

It exploits Android's Accessibility Services to capture data and control affected devices, bypassing latest security measures including Android 13 protections.

The malware employs a proprietary dropper to install itself discreetly, eluding Google's Play Protect and Accessibility Service restrictions.

A significant feature of Crocodilus is its ability to use screen overlays to deceive users into revealing their encryption keys, leveraging warnings about potential wallet access loss.

Initially, Crocodilus has been observed focusing on users in Turkey and Spain, capturing not only crypto-wallet access but also banking information.

The origin of the malware appears to be Turkish, based on debug messages analyzed by researchers.

ThreatFabric highlights the malware's versatile command functionality, including RAT operations which allow remote attackers to perform actions like screen taps and swipes.

Recommendations for Android users include avoiding downloads from unofficial platforms and maintaining active Play Protect configurations.