
Android users face a new invisible threat as the Crocodylus Trojan now adds fake trusted contacts to victims’ phones, making scam calls appear legitimate while stealing cryptocurrency wallet credentials.
Key Takeaways
- The Crocodylus Android Trojan creates deceptive fake contacts on infected devices to make scam calls appear legitimate, such as “Bank Support”
- After gaining Accessibility Service access, the malware can monitor typed text, steal crypto wallet credentials, and remotely control devices
- Originally targeting Turkey, Crocodylus has expanded globally with sophisticated evasion techniques including code packing and XOR encryption
- Users should only download apps from Google Play, keep Play Protect active, and independently verify contact information for financial institutions
- The malware can bypass Play Protect on Android 13 and newer devices, making vigilance against suspicious links and messages essential
Evolving Tactics of a Digital Predator
The Crocodylus Android Trojan, first documented by Threat Fabric in March 2025, has evolved from small-scale campaigns in Turkey into a global threat with sophisticated capabilities aimed at cryptocurrency theft. Security researchers have identified a concerning new feature in the malware’s arsenal – the ability to create fake contacts directly on infected Android devices. This creates a perfect cover for scammers, as their calls appear to come from legitimate sources like “Bank Support” rather than unknown numbers that might trigger suspicion from security-conscious users.
What makes Crocodylus particularly dangerous is its ability to bypass Google Play Protect on Android 13 and newer devices. The malware typically infiltrates devices through malicious advertisements, phishing text messages (smishing), or third-party applications outside the Google Play Store. Once installed, it gains access to the Accessibility Service, giving it extensive control over the victim’s device, including the ability to log keystrokes, harvest account credentials, and eventually drain cryptocurrency wallets.
“This further increases the attacker’s control over the device. We believe the intent is to add a phone number under a convincing name such as ‘Bank Support,’ allowing the attacker to call the victim while appearing legitimate,” according to Threat Fabric.
The Fake Contact Deception
The newest version of Crocodylus adds a particularly insidious feature: the creation of fake contacts that only exist locally on the compromised device. These contacts don’t sync to the user’s Google account, making them difficult to detect through regular account monitoring. When the attacker calls or texts the victim using the spoofed number, the communication appears to come from a trusted source, significantly increasing the likelihood that the victim will engage with the scammer and potentially divulge sensitive financial information.
The sophisticated command structure of the malware allows for precise control over when and how these fake contacts are added. According to security researchers, the Trojan responds to specific commands from its operators to add contacts as needed for their scamming operations. This level of control demonstrates the increasingly professional nature of mobile malware development, where cybercriminals continuously refine their tactics to maximize financial returns.
“Upon receiving the command ‘TRU9MMRHBCRO’, Crocodylus adds a specified contact to the victim’s contact list,” according to Threat Fabric.
Technical Sophistication and Evasion Techniques
Crocodylus demonstrates sophisticated technical capabilities that make it difficult for both users and security software to detect. Recent updates include improved evasion techniques such as code packing, “XOR encryption”, and code convolution that significantly hinder reverse engineering efforts by security researchers. The malware now parses stolen data locally on infected devices before exfiltration, allowing for more targeted and higher-quality data collection that focuses on valuable financial information.
These improvements represent a concerning trend in mobile malware development, where threat actors constantly refine their methods to stay ahead of security measures. Crocodylus has evolved from a geographically limited threat to a global concern, with American Android users now firmly in its crosshairs. This expansion indicates successful monetization of the malware, providing resources for continued development and more sophisticated attacks targeting cryptocurrency holders specifically.
Protecting Yourself Against Crocodylus
In the face of this evolving threat, Android users must take proactive steps to protect their devices and financial assets. Most importantly, only download applications from the official Google Play Store, not third-party sources or direct downloads. Even when using the Play Store, check developer credentials, read reviews, and verify app permissions before installation. Keep Google Play Protect active on your device, as it provides an additional layer of security that can detect some variants of Crocodylus and other malware.
Be extremely cautious with any unsolicited communications, particularly those with urgent requests or emotional appeals. Independently verify contact information for financial institutions rather than trusting numbers provided in emails, texts, or calls. When receiving calls from what appear to be legitimate contacts, be wary if the caller asks for unusual information or directs you to take immediate financial actions. Remember that Crocodylus specifically targets cryptocurrency wallet credentials, so be particularly vigilant regarding any communications about digital assets.
President Trump’s administration has consistently emphasized cybersecurity as a national priority, and this latest threat underscores the importance of personal vigilance in protecting our digital lives. As cryptocurrencies become more mainstream, we can expect increasingly sophisticated attacks targeting these relatively unregulated assets. Stay alert, verify independently, and remember that legitimate financial institutions never pressure customers into immediate action.