Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

    Nisan 18, 2026

    Apple AirTags Revisited After 5 Years: How They Stack Up Today

    Nisan 18, 2026

    Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

    Nisan 18, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

      Nisan 18, 2026

      Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

      Nisan 18, 2026

      How to Use AI Safely at Work: 4 Practical Tips

      Nisan 18, 2026

      Turn an Old Tablet into a Smart Home Control Hub

      Nisan 18, 2026

      Gemini Mac App Tested: Key Edge Over Web Version

      Nisan 18, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Android malware Crocodilus fakes trusted contacts for scam calls
    Tech

    Android malware Crocodilus fakes trusted contacts for scam calls

    By ayaksızHaziran 5, 2025Yorum yapılmamış2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    If you’re like most smartphone users today, chances are you already dread the constant deluge of spam calls. But scammers are now taking advantage of that exact frustration in a disturbingly creative way. A newly observed variant of the Crocodilus Android malware has been found to manipulate a user’s contact list, adding fake entries that mask scam calls under friendly, familiar-looking names like “Bank Help Center.” It’s a move designed to lower your guard, and it’s an unsettling reminder of just how sophisticated social engineering tactics have become.

    This behavior, detailed by cybersecurity researchers at Threat Fabric and reported by BleepingComputer, marks an evolution for Crocodilus. Previously known primarily for its use in crypto wallet and banking credential theft, the malware has largely relied on its core functionality: quietly seizing control of an Android device to scan for financial vulnerabilities. However, this new contact spoofing capability adds another layer to the threat. By faking contact names rather than simply spoofing caller ID information, attackers are essentially rewriting the victim’s phonebook to aid their scams—making phishing calls look less like a red flag and more like routine support outreach.

    The malware has so far been spread through malicious sideloaded apps—apps installed outside the official Google Play Store, often promoted via scammy ads on social media. While Turkey appears to be the original testing ground, the campaign has expanded into broader regions, including parts of Europe, South America, and even the U.S. What’s particularly alarming is the coordination this suggests: once Crocodilus infects a phone and identifies promising targets, the data may be relayed to human-operated scam centers capable of using social engineering to extract even more money or access. It’s not just about stealing passwords—it’s about manipulating trust itself.

    While this behavior is currently confined to Android devices, the concept could easily migrate to other platforms. Email accounts, messaging apps, and cloud-based contact lists are all potential attack surfaces where fake entries could help scammers impersonate trusted sources. And that means the usual advice holds stronger than ever: never install apps from unverified or suspicious sources, no matter how convincing the ad might be. Malware like Crocodilus thrives on complacency and familiarity—and the best defense is staying aware that even something as benign as your contacts list might be turned against you.

    Post Views: 276
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

    Nisan 18, 2026

    Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

    Nisan 18, 2026

    How to Use AI Safely at Work: 4 Practical Tips

    Nisan 18, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.