<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>ThreatFabric &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/threatfabric/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Tue, 03 Jun 2025 15:03:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</title>
		<link>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</link>
					<comments>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 15:03:07 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[ThreatFabric]]></category>
		<category><![CDATA[Trojan]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</guid>

					<description><![CDATA[<p>Crocodilus, a notorious Android banking trojan, has broadened its malicious campaigns to target cryptocurrency users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial Crocodilus instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details. Recent activities, however, indicate that the Trojan has [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Crocodilus</em>, a notorious Android banking trojan, has broadened its malicious campaigns to target <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial <em>Crocodilus</em> instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details.</p>
<p>Recent activities, however, indicate that the Trojan has extended its scope, striking victims in Poland, Spain, Argentina, Brazil, Indonesia, India, and the US, as per the latest data from ThreatFabric&rsquo;s Mobile Threat Intelligence (MTI) team.</p>
<p>In Poland, the malware exploited Facebook Ads to circulate deceptive loyalty apps. Users who clicked on the advertisement were redirected to harmful websites that delivered a <em>Crocodilus</em> dropper, evading Android 13+ security measures. Facebook&rsquo;s transparency data reveals that these ads reached thousands of users within one to two hours, primarily targeting those aged 35 and above.</p>
<p>Once installed, <em>Crocodilus</em> overlays fraudulent login screens over authentic banking and <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> apps. In Spain, it poses as a browser update, targeting nearly all major banks. Apart from its geographical expansion, <em>Crocodilus</em> has also acquired new skills. These include the ability to alter infected devices&rsquo; contact lists, enabling hackers to add phone numbers labeled as &ldquo;Bank Support&rdquo; for potential social engineering attacks.</p>
<p>Another significant enhancement is an automated seed phrase collector targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> wallets. The <em>Crocodilus</em> malware is now capable of extracting seed phrases and private keys more accurately, providing attackers with pre-processed data for quick account takeovers.</p>
<p>The developers have also bolstered <em>Crocodilus&rsquo;</em> defenses with deeper obfuscation. The newest variant combines packed code, extra XOR encryption, and deliberately complex logic to thwart reverse engineering. MTI analysts have also noted smaller campaigns focusing on <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> <a class="lar-automated-link" href="https://www.goldshell.com/product/goldshell-al-box-%e2%85%b1/?campaign=cryptoupdate&amp;gsaf=fehumarketing" rel="nofollow noopener" target="_blank" 8475>mining</a> apps and European digital banks as part of <em>Crocodilus&rsquo;</em> increasing interest in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a>.</p>
<p>Related to this, an April 22 report by <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> forensics and compliance firm AMLBot disclosed that <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> drainers, malware designed to pilfer <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a>, are becoming more accessible as the ecosystem evolves towards a software-as-a-service business model.</p>
<p>The report revealed that malware spreaders can rent a drainer for as little as 100 to 300 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDt</a> (<a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a>). On May 19, it was disclosed that Procolored, a Chinese printer manufacturer, had been distributing Bitcoin-stealing malware along with its official drivers, using USB drivers to distribute contaminated software and uploading the compromised software to cloud storage for global access.</p>


<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
