Malware crocodileus attacks cryptocurrency wallets in Android Systems – Computers

The Cyber Seirsecurity Field Effect has announced the invention of the new malware, called Crocodileus, which attacks cryptocurrency users, and can steal their keys to portfolio. You Malware transforms itself into a legitimate app, and the victims have been mistaken by introducing their seed phrases, which acts as passwords, with the pretext of making a security copy.
Oh Crocodilus works through fake warnings, pressing customers to enter their recovery keys in a short time, threatens lost access. After receiving these keys, malware will senses and transmit this data to its operators, resulting in the total control of the victim’s crypto assets.
At the moment, only victims are found in Turkey and Spain, but researchers think they can extend to other countries. The number of victims of this new crypto -focused malware is also unknown.
Oh Malware is delivered by dropper (Trojan Horse) designed to overcome Android security measures, Especially in versions from Android 13. This allows crocodileus to install without the need for clear permits of users, which can burn the protection of Google Play.
OS Field Effect Investigators said it was not yet known how users were cheated to download the dropBut they believe it is accessible to apps through malicious websites and social networks or text messages, as well as alternative stores.
OS Customers need to take care of this malware because in addition to stealing crypto accounts, it can get the control of infected devices.
Field Effect only recommends users Download official apps from official stores such as Google Play, Non -Reltyable Non -Side Lading Software Side Lading Escapes. They are always doubtful when the apps are asked to enter sensitive data under pressure. They should also install fresh security updates and use when antivirus.
In the case of cryptocurrency users, the best way to cultivate Use hardware wallets to store their offline private keys so that the cases of infected devices have immunity from malware. They should also hide the digital wallet behind the masterpiece. Other actions are indicated on the blog of the use of multiple signatures and always keeping online passwords Enterprise.