Connect with us

Technology

Android malware poses as fake contacts to steal your personal data

Published

on

Android malware poses as fake contacts to steal your personal data

NEWYou can now listen to Fox News articles!

Hacking keeps evolving, just like any other profession. Cybercriminals are always upgrading their tools, especially malware, to find new ways to scam people and steal data or money. The old tricks no longer work as well. Basic phishing rarely fools anyone twice, so hackers constantly look for new ways to break in.

They rely on whatever grabs your attention and doesn’t raise suspicion, things like social media ads, fake banking apps or updates that look completely normal. One of the fastest-growing threats in this space is Crocodilus. 

First detected in early 2025, this Android banking Trojan takes over your contact list to make its scams look more legitimate and harder to spot.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

Android phone  (Kurt “CyberGuy” Knutsson)

Crocodilus malware: What Android users must know now

The Crocodilus malware was first documented by ThreatFabric cybersecurity researchers in late March 2025. They highlighted its extensive data theft and remote control capabilities.

Crocodilus uses Facebook to infect devices. It appears in ads that look normal, but once clicked, the malware installs itself on your device. In some cases, it mimicked banking and e-commerce apps in Poland, promising users free points in exchange for downloading an app. The link led to a fake site that delivered the malware. Although the ad was only live for a few hours, it still reached thousands of users, most of whom were over 35, a group more likely to have money in the bank.

Smaller but growing campaigns have also been reported in the United States, where Crocodilus disguised itself as crypto wallet tools, mining apps and financial services. These fake apps are often distributed through social media ads or phishing links, targeting Android users who are less likely to question a “legit-looking” financial app. While not yet widespread, the presence of Crocodilus in the U.S. underscores its global reach and rapidly evolving tactics.

ANDROID SECURITY UPGRADES OUTSMART SCAMS AND PROTECT YOUR PRIVACY

Advertisement

The Trojan has also been spotted in Spain, where it disguised itself as a browser update, targeting nearly every major Spanish bank. In Turkey, it posed as an online casino app. And the threat doesn’t stop there.

One of the biggest concerns with Crocodilus is its ability to add fake contacts to your phone, inserting entries like “Bank Support” into your contact list. So, if an attacker calls pretending to be from your bank, your phone may not flag it because it appears to be a trusted number, making social engineering scams much more convincing.

The latest version also includes a more advanced seed phrase collector, especially dangerous for cryptocurrency users. Crocodilus monitors your screen and uses pattern matching to detect and extract sensitive data, such as private keys or recovery phrases, all before quietly sending it to the attacker.

Illustration of a hacker at work  (Kurt “CyberGuy” Knutsson)

MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINS

Advertisement

How Crocodilus signals the future of mobile malware threats

Crocodilus shows us what the next wave of mobile threats might look like. It uses real ads to get into your phone. It blends into your digital life in ways that feel familiar. It does not need flashy tricks to succeed. It just needs to appear trustworthy.

This kind of malware is designed for scale. It targets large groups, works across different regions and updates fast. It can pretend to be a bank, a shopping app or even something harmless like a browser update. The scary part is how normal it all looks. People are not expecting something this malicious to hide inside something that looks like a gift.

The creators of Crocodilus understand how people think and act online. They are using that knowledge to build tools that work quietly and effectively. And they are not working alone. This kind of operation likely involves a network of developers, advertisers and distributors all working together.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A woman working on her laptop with her phone nearby   (Kurt “CyberGuy” Knutsson)

Advertisement

HR FIRM CONFIRMS 4M RECORDS EXPOSED IN MAJOR HACK

7 expert tips to protect your Android from Crocodilus malware

1. Avoid downloading apps from ads or unknown sources: Crocodilus often spreads through ads on social media platforms like Facebook. These ads promote apps that look like banking tools, e-commerce platforms or even crypto wallets. If you click and install one, you might be unknowingly downloading malware. Always search for apps directly on trusted platforms like the Google Play Store. Do not install anything from random links, especially those shared through ads, messages or unfamiliar websites.

2. Avoid suspicious links and install strong antivirus protection: Crocodilus spreads through deceptive ads and fake app links. These can look like legitimate banking tools, crypto apps or browser updates. Clicking on them may quietly install malware that hijacks your contacts, monitors your screen or steals login credentials. To stay safe, avoid clicking on links from unknown sources, especially those that promise rewards or warn of urgent problems. Installing strong antivirus software on your Android device adds another layer of protection. It can scan downloads, block malicious behavior and warn you about phishing attempts before they become a bigger issue. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3. Review app permissions carefully before and after installation: Before you install an app, take a moment to look at the permissions it asks for. If a shopping app wants access to your contacts, messages or screen, that is a red flag. After installing, go to your phone settings and double-check what permissions the app actually has. Malware like Crocodilus relies on overreaching permissions to steal data and gain control. If anything seems unnecessary, revoke the access or uninstall the app entirely.

4. Keep your Android device updated at all times: Security patches are released regularly to block known vulnerabilities. Crocodilus is designed to take advantage of outdated systems and bypass newer Android restrictions. By updating your phone and apps regularly, you reduce the chances of malware slipping through. Set your device to install updates automatically when possible and check manually every so often if you are not sure.

Advertisement

5. Consider using a data removal or monitoring service: While not a direct defense against malware, data removal services can help minimize the damage if your information has already been leaked or sold. These services monitor your personal data on the dark web and offer guidance if your credentials have been compromised. In a case like Crocodilus, where malware may harvest and transmit banking info or crypto keys, knowing your data exposure early can help you act before scammers do. Check out my top picks for data removal services here. 

Get a free scan to find out if your personal information is already out on the web

6. Turn on Google Play Protect: Google Play Protect is a built-in security feature on Android phones that scans your apps for anything suspicious. To stay protected, make sure it’s turned on. You can check this by opening the Play Store, tapping your profile icon and selecting Play Protect. From there, you can see if it’s active and run a manual scan of all your installed apps. While it may not catch everything, especially threats from outside the Play Store, it’s still an important first layer of defense against harmful apps like Crocodilus.

7. Be skeptical of unfamiliar contacts or urgent messages: One of the newer tricks Crocodilus uses is modifying your contact list. It can add fake entries that look like customer service numbers or bank helplines. So, if you receive a call from “Bank Support,” it might not be real. Always verify phone numbers through official websites or documents. The same applies to messages asking for personal details or urgent logins. When in doubt, do not respond or click any links. Contact your bank or service provider directly.

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Advertisement

Kurt’s key takeaway

Crocodilus is one of the most advanced Android banking Trojans seen so far. It spreads through social media ads, hides inside apps that look real and collects sensitive data like banking passwords and crypto seed phrases. It can also add fake contacts to your phone to trick you during scam calls. If you use Android, avoid downloading apps from links in ads or messages. Only install apps from trusted sources like the Google Play Store. Keep your phone updated, and be careful if something looks too good to be true because it probably is. 

Who should be held accountable when malware like Crocodilus spreads through platforms like Facebook? Let us know by writing to us at Cyberguy.com/Contact

For more of my tech tips anbd security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Advertisement

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.  

Advertisement

Technology

Rad Power Bikes files for bankruptcy protection

Published

on

Rad Power Bikes files for bankruptcy protection

Rad Power Bikes, the once dominant electric bicycle brand in the US, filed for Chapter 11 bankruptcy protection this week as it seeks to sell of its company. The move comes less than a month after Rad Power said it could not afford to recall its older e-bike batteries that had been designated a fire risk by the US Consumer Protection Safety Commission.

The bankruptcy, which was first reported by Bicycle Retailer, was filed in US Bankruptcy Court for the Eastern District of Washington, near the company’s headquarters in Seattle. Rad Power lists its estimated assets at $32.1 million and estimated liabilities at $72.8 million. Its inventory of e-bikes, spare parts, and accessories is listged at $14.2 million, Bicycle Retailer says.

It’s a stunning reversal for the once leading e-bike company in the US. Mike Radenbaugh founded the company in 2015 after several years of selling custom-made e-bikes to customers on the West Coast. Rad Power quickly grew to over 11 distinct models, including the fat-tire RadRover, the long-tail RadWagon, and the versatile RadRunner. Rad Power Bikes raised an approximate total of $329 million across several funding rounds, primarily in 2021, with major investments from firms like Fidelity, Morgan Stanley, and T. Rowe Price.

But in the wake of the post-covid bike boom, things started to go south. There were supply chain disruptions, safety recalls, several rounds of layoffs, and executive turnover. Last month, Rad Power said it was facing “significant financial challenges” that could lead to its imminent closure without a cash infusion.

The CPSC warning apparently was the nail in the coffin. The company’s older batteries could “unexpectedly ignite and explode,” the agency warned, citing 31 fires, including 12 reports of property damage totaling $734,500. There weren’t any injuries, but the company said it couldn’t afford a costly recall.

Advertisement

Rad Power could still live on if its able to find a buyer for its assets and brand. Dutch e-bike make VanMoof was able to find a buyer following its 2023 bankruptcy. And Belgium’s Cowboy is in talks to be acquired by a French holding company of several bike brands. Rad Power will continue to operate as it restructures its debts under court supervision, and in a statement to Bicycle Retailer said it will continue to sell bikes and work with customers and vendors as it moves forward with the process.

Continue Reading

Technology

Chrome rolls out AI podcast feature on Android

Published

on

Chrome rolls out AI podcast feature on Android

NEWYou can now listen to Fox News articles!

Chrome on Android now offers a fresh way to digest information when your hands are busy or your eyes need a break.

A new update powered by Google Gemini can turn written webpages into short podcast-style summaries. Two virtual hosts chat about the content, making it feel easier to follow during your commute or while you multitask.

This upgrade builds on Chrome’s long-standing read-aloud tool, yet now adds a more natural and lively delivery. It does not work on every website, so some pages will still use the original word-for-word reading. When the AI option appears, though, the audio feels polished and smooth.

Below is how to try it on your Android phone right now.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

HOW TO DISABLE GEMINI AI ON ANDROID AND KEEP CONTROL OF YOUR APPS

Make sure you have the newest Chrome version so the AI podcast feature works. (Cyberguy.com)

Update Chrome before you start

First, make sure Chrome is current in the Play Store by opening the Play Store, searching for Google Chrome and tapping Update if it appears. The AI podcast feature works with version 140.0.7339.124 or newer, so confirm you have at least that version installed. Once you finish the update, open Chrome and pick any webpage with text you want to hear.

Settings may vary depending on your Android phone’s manufacturer.

Advertisement

Open the More menu

  • Tap the More icon or the three vertical dots in the upper right corner. This reveals a set of options that control how Chrome displays or reads the page.

Select Listen to this page

  • Choose Listen to this page. You will see a small Generating AI playback banner at the bottom. The processing is fast, so you will not wait long.

Hear the AI hosts discuss the page

  • Chrome will start a mini podcast with two voices talking through the content. You can tap the playback bar to pause, rewind or jump ahead. The panel stays on screen and follows you as you scroll.

Switch to standard playback when you want

  • The AI audio keeps going even if you leave the webpage. If you prefer a traditional word-for-word readback, tap the AI playback icon in the lower left and pick Standard Playback.

Chrome begins creating the AI audio as soon as you tap the “Listen to this Page” option. (iStock)

ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

What this means to you

This feature can make long articles easier to absorb when you are on the move. You get a quick, conversational rundown without having to read a full page. It also helps you revisit information faster since the controls work like any audio player. If you enjoy podcasts, this tool gives you a familiar way to stay informed without draining your attention.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Chrome’s AI podcast feature brings a new layer of convenience to Android. It saves time, reduces eye strain and turns everyday browsing into a hands-free audio experience. Since it still supports the standard read-aloud mode, you can switch back anytime.

Would you use AI hosts to read your favorite websites, or do you prefer the classic readback style? Let us know by writing to us at Cyberguy.com.

Advertisement

Using the new update powered by Google Gemini, you can change from the AI podcast to a simple word-for-word reading at any time. (“I’ve Had It” YouTube channel)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Even Trump’s chief of staff was ‘aghast’ at Elon Musk’s deadly USAID cuts

Published

on

Even Trump’s chief of staff was ‘aghast’ at Elon Musk’s deadly USAID cuts

Wiles says she called Musk on the carpet. “You can’t just lock people out of their offices,” she recalls telling him. At first, Wiles didn’t grasp the effect that slashing USAID programs would have on humanitarian aid. “I didn’t know a lot about the extent of their grant making.” But with immunizations halted in Africa, lives would be lost. Soon she was getting frantic calls from relief agency heads and former government officials with a dire message: Thousands of lives were in the balance.

Wiles continued: “So Marco is on his way to Panama. We call him and say, ‘You’re Senate-confirmed. You’re going to have to be the custodian, essentially, of [USAID].’ ‘Okay,’ he says.” But Musk forged ahead—all throttle, no brake. “Elon’s attitude is you have to get it done fast. If you’re an incrementalist, you just won’t get your rocket to the moon,” Wiles said. “And so with that attitude, you’re going to break some china. But no rational person could think the USAID process was a good one. Nobody.”

Continue Reading

Trending