🎉 [Gate 30 Million Milestone] Share Your Gate Moment & Win Exclusive Gifts!
Gate has surpassed 30M users worldwide — not just a number, but a journey we've built together.
Remember the thrill of opening your first account, or the Gate merch that’s been part of your daily life?
📸 Join the #MyGateMoment# campaign!
Share your story on Gate Square, and embrace the next 30 million together!
✅ How to Participate:
1️⃣ Post a photo or video with Gate elements
2️⃣ Add #MyGateMoment# and share your story, wishes, or thoughts
3️⃣ Share your post on Twitter (X) — top 10 views will get extra rewards!
👉
Crocodilus Android Trojan Spreads Globally, Gains New Features
HomeNews* A new Android banking trojan called Crocodilus is targeting users in Europe and South America.
Once installed, Crocodilus can launch “overlay attacks” on a list of banking applications. An overlay attack is when malware displays a fake login page over a real banking app to steal user credentials. ThreatFabric also reports that the trojan exploits Android’s accessibility settings to capture cryptocurrency wallet seed phrases and private keys, putting digital assets at risk.
Recent versions of Crocodilus can create a new contact on a victim’s device with a convincing name, such as “Bank Support.” If attackers use this feature, they can call victims and bypass anti-fraud warnings that appear during unknown number interactions. According to ThreatFabric, “We believe the intent is to add a phone number under a convincing name such as ‘Bank Support,’ allowing the attacker to call the victim while appearing legitimate. This could also bypass fraud prevention measures that flag unknown numbers.”
The malware now reaches more countries, including Spain, Turkey, Argentina, Brazil, India, Indonesia, and the United States. It continues to update its code to block security analysis and reverse engineering. ThreatFabric notes that Crocodilus campaigns are evolving and spreading, which makes them a growing concern for Android users worldwide (more details here).
Previous Articles: