<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Trojan &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/trojan/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Tue, 03 Jun 2025 15:03:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</title>
		<link>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</link>
					<comments>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 15:03:07 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[ThreatFabric]]></category>
		<category><![CDATA[Trojan]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</guid>

					<description><![CDATA[<p>Crocodilus, a notorious Android banking trojan, has broadened its malicious campaigns to target cryptocurrency users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial Crocodilus instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details. Recent activities, however, indicate that the Trojan has [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Crocodilus</em>, a notorious Android banking trojan, has broadened its malicious campaigns to target <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial <em>Crocodilus</em> instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details.</p>
<p>Recent activities, however, indicate that the Trojan has extended its scope, striking victims in Poland, Spain, Argentina, Brazil, Indonesia, India, and the US, as per the latest data from ThreatFabric&rsquo;s Mobile Threat Intelligence (MTI) team.</p>
<p>In Poland, the malware exploited Facebook Ads to circulate deceptive loyalty apps. Users who clicked on the advertisement were redirected to harmful websites that delivered a <em>Crocodilus</em> dropper, evading Android 13+ security measures. Facebook&rsquo;s transparency data reveals that these ads reached thousands of users within one to two hours, primarily targeting those aged 35 and above.</p>
<p>Once installed, <em>Crocodilus</em> overlays fraudulent login screens over authentic banking and <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> apps. In Spain, it poses as a browser update, targeting nearly all major banks. Apart from its geographical expansion, <em>Crocodilus</em> has also acquired new skills. These include the ability to alter infected devices&rsquo; contact lists, enabling hackers to add phone numbers labeled as &ldquo;Bank Support&rdquo; for potential social engineering attacks.</p>
<p>Another significant enhancement is an automated seed phrase collector targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> wallets. The <em>Crocodilus</em> malware is now capable of extracting seed phrases and private keys more accurately, providing attackers with pre-processed data for quick account takeovers.</p>
<p>The developers have also bolstered <em>Crocodilus&rsquo;</em> defenses with deeper obfuscation. The newest variant combines packed code, extra XOR encryption, and deliberately complex logic to thwart reverse engineering. MTI analysts have also noted smaller campaigns focusing on <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> <a class="lar-automated-link" href="https://www.goldshell.com/product/goldshell-al-box-%e2%85%b1/?campaign=cryptoupdate&amp;gsaf=fehumarketing" rel="nofollow noopener" target="_blank" 8475>mining</a> apps and European digital banks as part of <em>Crocodilus&rsquo;</em> increasing interest in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a>.</p>
<p>Related to this, an April 22 report by <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> forensics and compliance firm AMLBot disclosed that <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> drainers, malware designed to pilfer <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a>, are becoming more accessible as the ecosystem evolves towards a software-as-a-service business model.</p>
<p>The report revealed that malware spreaders can rent a drainer for as little as 100 to 300 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDt</a> (<a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a>). On May 19, it was disclosed that Procolored, a Chinese printer manufacturer, had been distributing Bitcoin-stealing malware along with its official drivers, using USB drivers to distribute contaminated software and uploading the compromised software to cloud storage for global access.</p>


<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beware of Fraudulent Phones Preloaded with Crypto-Stealing Malware</title>
		<link>https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/</link>
					<comments>https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Thu, 03 Apr 2025 06:01:00 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Triada]]></category>
		<category><![CDATA[Trojan]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/</guid>

					<description><![CDATA[<p>Cointelegraph reveals that scammers are peddling fake Android smartphones carrying preinstalled malware aimed at stealing cryptocurrency and other sensitive data. This alarming report comes from cybersecurity titan Kaspersky. These counterfeit Android devices are being sold at discounted rates, but they come preinfected with a variant of the notorious Triada Trojan. This malware infects every function [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/">Beware of Fraudulent Phones Preloaded with Crypto-Stealing Malware</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cointelegraph</em> reveals that scammers are peddling fake Android smartphones carrying preinstalled malware aimed at stealing <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> and other sensitive data. This alarming report comes from cybersecurity titan Kaspersky.</p>
<p>These counterfeit Android devices are being sold at discounted rates, but they come preinfected with a variant of the notorious Triada Trojan. This malware infects every function of the phone, providing the hackers with virtually limitless control over the device, warned Kaspersky in their April 1 statement.</p>
<p>Dmitry Kalinin, a cybersecurity specialist at Kaspersky, explained that the Trojan allows the perpetrators to steal <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> by switching wallet addresses once access to the device is granted. &ldquo;The creators of the new Triada variant are reaping significant financial benefits. Based on transaction analysis, they&rsquo;ve managed to funnel roughly $270,000 in multiple cryptocurrencies into their <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets,&rdquo; he shared.</p>
<p>However, the real figure could be much larger, as the attackers also targeted Monero, a <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> renowned for its anonymity. The Trojan also has the ability to pilfer user account details and intercept all text messages, including two-factor authentication.</p>
<p>The Trojan infiltrates smartphone firmware before the device even reaches consumers. Some online vendors may unsuspectingly be selling these infected phones. &ldquo;The supply chain is likely compromised at some point, so sellers may unknowingly be vending smartphones infected with Triada,&rdquo; Kalinin conjectured.</p>
<p>As of now, Kaspersky researchers have detected 2,600 instances of this scam across several countries. The majority of these cases were encountered in Russia in the first quarter of 2025.</p>
<p>First discovered in 2016, the Triada malware is notorious for targeting financial apps and messaging services like WhatsApp, Facebook, and Google Mail. It is typically spread via malicious downloads and phishing schemes, according to cybersecurity firm Darktrace.</p>
<p>&ldquo;The Triada Trojan has been around for a while and continues to be one of the most sophisticated and potent threats to Android,&rdquo; emphasized Kalinin. Kaspersky Labs advises consumers to protect themselves by purchasing devices only from authorized distributors and immediately installing security solutions after purchase.</p>
<p>Other cybersecurity firms have been flagging novel forms of malware targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> users. On March 28, Threat Fabric reported finding a new malware family that baits Android users into revealing their <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> seed phrases by launching a misleading overlay as it assumes control of the device.</p>
<p>Earlier, on March 18, tech behemoth Microsoft discovered a new remote access trojan (RAT) that targets <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> stored in 20 wallet extensions for the Google Chrome browser.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/">Beware of Fraudulent Phones Preloaded with Crypto-Stealing Malware</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
