Mar 31, 2025

Crocodilus Android Malware Hijacks Phones to Steal Crypto

A newly uncovered malware strain dubbed “Crocodilus” is emerging as one of the most sophisticated threats to Android users in recent memory. Disguised beneath a veneer of fake security alerts, this digital Trojan goes straight for the jugular—your seed phrase.

Discovered by cybersecurity firm ThreatFabric, Crocodilus represents a disturbing leap forward in the evolution of mobile malware. Its primary goal? Complete remote control of infected devices, with a particular focus on draining cryptocurrency wallets.

According to a March 28 report by ThreatFabric, Crocodilus mimics legitimate crypto apps using slick overlay attacks. These overlays are essentially counterfeit screens that pop up when a target app is launched, fooling users into inputting sensitive information directly into the hands of hackers.

One of its more devious tactics? A fake warning that pressures users to back up their seed phrase within a tight deadline:

“Back up your wallet key in the settings within 12 hours. Otherwise, the app will be reset, and you may lose access to your wallet,” according to ThreatFabric.

Threat Fabric

For many users, the urgency feels real—and that’s exactly when the trap is triggered. Crocodilus exploits Android’s accessibility services to log everything, including the seed phrase. Once captured, attackers can take full control and drain the wallet entirely.

More Than Malware—It’s Full Remote Takeover

While Crocodilus is new, its capabilities are anything but primitive. According to analysts, it checks all the boxes of modern banking malware: screen overlays, screen capture, data harvesting, and full remote access once installed.

Infection usually begins when users unknowingly download compromised software designed to bypass Android 13’s built-in security protocols. Once installed, the malware requests accessibility permissions—often disguised as legitimate functionality.

After gaining access, it connects to a command-and-control (C2) server, receives target instructions, and continuously monitors the device. When the user opens a banking or crypto app, the malware instantly deploys a fake overlay, mutes the sound, and executes background commands, effectively hijacking the device in real-time.

“With stolen credentials and remote access, Crocodilus enables threat actors to complete fraudulent transactions without alerting the user,” ThreatFabric noted.

ThreatFabric’s investigation shows that Crocodilus is currently targeting Android users in Turkey and Spain but warns the malware is highly scalable. It’s only a matter of time before it spreads across regions.

The malware’s code includes comments in Turkish, leading analysts to believe the developers may be native speakers. They also speculate that a known hacker, “Sybra”, or an unknown actor testing a new toolset could be behind the campaign.

This incident is a chilling reminder that mobile crypto wallets—long seen as secure and convenient—are increasingly under siege. With malware like Crocodilus growing more advanced, the cost of a single misstep could be devastating.

As the digital asset space continues to expand, so too does the attack surface. Crocodilus proves that crypto users must stay vigilant, not just with their assets, but with the very devices they use to manage them.

The Bottom Line: Update, Audit, and Stay Paranoid

Security must evolve alongside innovation in a world where a simple overlay can lead to a total crypto wipeout. Users are urged to stick to official app stores, verify app permissions, and never enter sensitive information under pressure or time-based warnings.

Sometimes, the biggest threat to your wallet isn’t a market crash, it’s malware you can’t even see.

Explore more articles like this

Subscribe to the newsletter

CoinRock Media covers the latest crypto news, delving into the future of money.

Read More