Initially hidden as legitimate applications such as Google Chrome, Crocodilus uses complex methods to steal inputs, passwords and sentences from crypto money wallets and apply windows to applications.

In addition to the standard algorithms for the theft of Crocodilus, Crocodilus, the Trojan Horse adds false contacts to the victim’s phone even with the “Bank Support Service” inscription to overcome the mechanisms of detecting fraud in Android.

Crocodilus spreads with fake ads on platforms such as Facebook and attracts users with false sentences that hide harmful connections. Increasing the complexity of Trojan is an important threat and makes it difficult to analyze and detect harmful activity.

* The organization is accepted as pro -excessive, its activities are prohibited in Russia.

Source: Ferra

Previous articleThe endocrinologist recommended to limit strawberry consumption for gastric and health diseases.
Next articleAcademician Onishchenko, Morning in the Country or 105 June 2025, 01:30
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here