The mobile banking Trojan landscape has reached a new level of sophistication with the emergence of Crocodilus, a fully-featured malware family recently uncovered by ThreatFabric. Unlike typical copycat malware, Crocodilus enters the threat landscape as a mature banking Trojan with advanced capabilities like remote device control, black screen overlays, and Accessibility-based data harvesting.
“Crocodilus is not a simple clone, but a fully-fledged threat from the outset, equipped with modern techniques such as remote control, black screen overlays, and advanced data harvesting via accessibility logging.” – ThreatFabric Report
This malware is already targeting banks in Spain and Turkey, as well as cryptocurrency wallets, posing a severe risk to mobile users worldwide.
Crocodilus follows the typical Device Takeover (DTO) banking Trojan playbook but with enhanced stealth and efficiency.
Crocodilus spreads via a proprietary dropper designed to circumvent Android’s security restrictions. Once installed, it abuses Accessibility Services—a common but effective tactic seen in other banking Trojans like Anatsa and Octo. ThreatFabric mention that Initial installation is done via a proprietary dropper bypassing Android 13+ restrictions. Once installed, Crocodilus requests Accessibility Service to be enabled.
The malware employs dynamic overlay attacks, fetching fake login screens from its C2 server based on the app opened by the victim.
“Crocodilus monitors all Accessibility events, capturing every element displayed on the screen. This goes beyond simple keylogging—it records all text changes performed by the victim.” – ThreatFabric
One of the most dangerous features is hidden remote control. When activated:
The malware includes a dedicated RAT command (TG32XAZADG) to capture Google Authenticator OTPs by scraping screen content via Accessibility Services and communicate with c2 server.
For cryptocurrency wallets, Crocodilus displays a fake warning like below-
This manipulates victims into revealing their seed phrase, which the malware then harvests via Accessibility Logging.
Moreover, Crocodilus support a lots of Bot and RAT commands like
ThreatFabric found references to “sybupdate” in Crocodilus’s code, potentially linking it to “sybra”, a threat actor previously associated with:
However, it remains unclear whether sybra developed Crocodilus or is merely an early adopter. Whether ThreatFabric research team found that first Crocodilus samples contain the tag ‘sybupdate, which could be linked to ‘sybra.
Additionally, Turkish-language debug messages suggest the developers may be Turkish-speaking.
For End Users:
Avoid sideloading APKs – Only use Google Play Store.
Never enable Accessibility for untrusted apps – Legitimate apps don’t require this for basic functions.
Use hardware security keys (e.g., YubiKey) instead of SMS/OTP-based 2FA.
Install a reputable mobile security solution with behavioral detection.
For Financial Institutions:
🔒 Implement device risk scoring to detect compromised devices.
🔒 Adopt strong customer authentication (SCA) measures beyond SMS OTPs.
Crocodilus represents a significant leap in Android banking Trojan sophistication, combining stealth, remote control, and psychological manipulation to maximize theft. Its capabilities suggest that traditional signature-based detection is insufficient—proactive behavioral analysis and layered security are now essential.
Stay vigilant and secure!