By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Daily HacklyDaily HacklyDaily Hackly
  • Tech & Digital Trends
  • Entertainment & Lifestyle
  • Money & Smart Living
  • Productivity & Life Hacks
Search
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Beware: New Android Malware Compromises Security by Incorporating Trusted Contacts into Your Device
Share
Sign In
Notification Show More
Font ResizerAa
Daily HacklyDaily Hackly
Font ResizerAa
Search
  • Home
    • Home 4
  • Categories
  • Bookmarks
  • More Foxiz
    • Sitemap
Have an existing account? Sign In
Follow US
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Daily Hackly > Blog > Tech & Digital Trends > Beware: New Android Malware Compromises Security by Incorporating Trusted Contacts into Your Device
Tech & Digital Trends

Beware: New Android Malware Compromises Security by Incorporating Trusted Contacts into Your Device

DailyHackly
Last updated: June 21, 2025 10:20 am
DailyHackly
Share
Beware: New Android Malware Compromises Security by Incorporating Trusted Contacts into Your Device
SHARE

Emerging Threats in Scam Detection: Understanding the Crocodilus Malware

As technology advances in detecting fraudulent calls and messages, scammers continually develop new tactics to bypass these defenses. Currently, Android device users face a rising threat from malware capable of fabricating fake contacts. As a result, calls and texts from these malicious entities may appear under familiar names, which increases the likelihood of users being deceived.

Understanding the Functionality of Crocodilus Malware

Discovered earlier this year by the cybersecurity company Threat Fabric, the Crocodilus malware is a form of Trojan that overtakes devices with the aim of deceiving users into revealing their cryptocurrency wallet seed phrases, misleading them into thinking they need to secure their keys. Once the malware is introduced—whether through malicious advertisements, smishing campaigns, or third-party applications—it can circumvent Google Play Protect on Android 13 and later versions. This allows it to exploit Accessibility Services, logging and capturing account credentials. Ultimately, this grants cybercriminals control over and the ability to drain victims’ cryptocurrency wallets.

The latest updates to this malware have introduced a command that permits the addition of contacts directly to the device’s contact list. Consequently, when an attacker places a call, their number will register in caller ID as a legitimate entity, such as “Bank Support,” thus making users more likely to interact and trust the source. Reports from Bleeping Computer indicate that these forged contacts remain isolated to the infected device and do not sync with the user’s Google account.

Precautions Android Users Should Take

Initially, Crocodilus campaigns were confined to a handful of countries, but the scope has broadened globally, even reaching the United States. To safeguard Android devices from infection, it is crucial to download applications exclusively from Google Play, ensuring they are from trusted sources, while keeping Play Protect enabled to intercept potential threats.

Furthermore, maintaining a high level of vigilance against social engineering strategies is essential. These tactics are often employed by malicious actors seeking to manipulate individuals into installing malware or divulging sensitive information. Cyber threats commonly take advantage of human psychology, using tactics like impersonating authority figures and exploiting emotions such as fear or greed.

It is recommended to refrain from downloading attachments or clicking links present in unsolicited messages. Instead, navigate directly to websites of interest. If there are doubts about the legitimacy of a call or message, contact the company using a public number rather than responding to an unexpected call. Be cautious of anything that appears urgent or elicits strong emotional responses. Additionally, avoid clicking on advertisements, downloading unknown software, or following social media prompts, as these may also lead to malware infections, according to DailyHackly.

By staying informed and exercising caution, users can better protect themselves from the growing range of digital threats.

You Might Also Like

The Increasing Phenomenon of AI Model Hallucinations: Unraveling the Uncertainty Behind the Cause

Uncovering the Overlooked FAQs of Windows 11 That May Reveal the Reasons Behind Your PC’s Sluggish Performance

Comparing the Boox Note Air 4C and the Boox Note Max: A Comprehensive Analysis

Five Surprising Uses for the Snipping Tool in Windows

Meta Fully Committed to Enhancing Community Notes

TAGGED:application malveillanteastuces de sécuritéconfidentialitécontacts de confiancecybersécuritémalware Androidmenaces numériquesprévention des malwaresprotection contre les malwaresprotection des donnéessécurité des appareilssécurité des smartphonessécurité informatiquesécurité mobilevulnérabilités Android

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article In-Depth Analysis of the Boox Go 7: A Comprehensive Review In-Depth Analysis of the Boox Go 7: A Comprehensive Review
Next Article Top Free VPN Options for Android Devices Top Free VPN Options for Android Devices
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1kLike
69.1kFollow
134kPin
54.3kFollow
banner banner
Create an Amazing Newspaper
Discover thousands of options, easy to customize layouts, one-click to import demo and much more.
Learn More

Latest News

Accessing Pornhub: Strategies for Bypassing State Restrictions
Accessing Pornhub: Strategies for Bypassing State Restrictions
Tech & Digital Trends
Samsung Set to Remove Inactive Accounts Unless Users Log In
Samsung Set to Remove Inactive Accounts Unless Users Log In
Tech & Digital Trends
Evaluating Bing’s Complimentary AI Video Creator: A Comparison with Premium Alternatives
Evaluating Bing’s Complimentary AI Video Creator: A Comparison with Premium Alternatives
Tech & Digital Trends
Top Free VPN Options for Android Devices
Top Free VPN Options for Android Devices
Tech & Digital Trends
//

We influence 20 million users and is the number one business and technology news network on the planet

Quick Link

  • Contact
  • Blog
  • Complaint
  • Advertise

Support

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

Daily HacklyDaily Hackly
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
[mc4wp_form]
Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?