<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>amlbot Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/amlbot/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/amlbot/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Tue, 03 Jun 2025 13:21:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>amlbot Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/amlbot/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Crocodilus Malware Expands to Crypto Wallets</title>
		<link>https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/</link>
					<comments>https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 17:00:43 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[amlbot]]></category>
		<category><![CDATA[Android 13]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[Crocodilus]]></category>
		<category><![CDATA[crypto drainers]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[Facebook ad scam]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[mobile malware]]></category>
		<category><![CDATA[mobile threat]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[private keys]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[South America]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[ThreatFabric]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43731</guid>

					<description><![CDATA[<p>Malicious mobile software continues to evolve—sometimes faster than defenses. One recent threat, Crocodilus, has shifted its focus beyond banking apps to now infiltrate cryptocurrency wallets across multiple continents. First seen in Turkey in March 2025, Crocodilus is now active in countries like Poland, Spain, Brazil, Argentina, India, Indonesia, and the U.S., signaling a global expansion</p>
<p>The post <a href="https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/">Crocodilus Malware Expands to Crypto Wallets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="2835" data-end="3062">Malicious mobile software continues to evolve—sometimes faster than defenses. One recent threat, <strong data-start="2932" data-end="2946">Crocodilus</strong>, has shifted its focus beyond banking apps to now infiltrate cryptocurrency wallets across multiple continents.</p>
<p data-start="3064" data-end="3288">First seen in Turkey in March 2025, <strong>Crocodilus</strong> is now active in countries like Poland, Spain, Brazil, Argentina, India, Indonesia, and the U.S., signaling a global expansion that concerns both banks and crypto holders alike.</p>
<h2 data-start="3295" data-end="3325">Fake Apps, Real Intrusions</h2>
<p data-start="3327" data-end="3599">In Poland, attackers used <strong data-start="3353" data-end="3369">Facebook </strong>ads to lure users with bogus loyalty app promotions. These ads—targeted at users over 35—redirected victims to malware-hosting sites. Once installed, the Trojan bypassed <strong data-start="3536" data-end="3550">Android 13</strong> restrictions and deployed its attack mechanisms.</p>
<hr />
<p data-start="3601" data-end="3889"><em>You Might Be Interested In: <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></span></em></p>
<hr />
<p data-start="3601" data-end="3889">In Spain, <strong>Crocodilus</strong> disguised itself as a browser update. Once on a device, it overlays fake login pages on top of real banking and crypto apps, harvesting sensitive credentials. It even inserts fake “Bank Support” contacts into user phonebooks to aid social engineering efforts.</p>
<p data-start="3601" data-end="3889"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-157595 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/06/crocodilus-1024x575.png" alt="crocodilus" width="814" height="457" /></p>
<h2 data-start="3896" data-end="3934">Crypto Wallets Under Direct Attack</h2>
<p data-start="3936" data-end="4182">The most alarming upgrade is <strong>Crocodilus</strong>’ new ability to automatically extract seed phrases and private keys from infected devices. Equipped with advanced parsing modules, the malware can quickly hijack wallet access with remarkable precision.</p>
<p data-start="4184" data-end="4371">To avoid detection, the latest variant uses deep obfuscation techniques like XOR encryption and intentionally complex logic, making reverse engineering a challenge for security teams.</p>
<p data-start="4373" data-end="4529">Smaller campaigns have also been seen targeting crypto mining apps and digital banks in Europe—highlighting the malware&#8217;s growing focus on crypto users.</p>
<hr />
<p data-start="4373" data-end="4529"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <span style="color: #0000ff;"><a href="https://t.me/coinengineernews">Telegram</a><span style="color: #000000;">,</span> <a style="color: #0000ff;" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube</a></span><span style="color: #000000;">,</span> and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><span style="color: #0000ff;">Twitter</span></a> channels for the latest<span style="color: #0000ff;"> <a style="color: #0000ff;" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a></span> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/">Crocodilus Malware Expands to Crypto Wallets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crocodilus-malware-expands-to-crypto-wallets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Panicked Bitcoiner Loses Over $70K in RBF Fee Error!</title>
		<link>https://coinengineer.net/blog/panicked-bitcoiner-loses-over-70k-in-rbf-fee-error/</link>
					<comments>https://coinengineer.net/blog/panicked-bitcoiner-loses-over-70k-in-rbf-fee-error/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 12:00:20 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[amlbot]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[bitcoin cash]]></category>
		<category><![CDATA[bitcoin fee]]></category>
		<category><![CDATA[bitcoin loss]]></category>
		<category><![CDATA[blockchain feature]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[crypto mistake]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[fee error]]></category>
		<category><![CDATA[mempool]]></category>
		<category><![CDATA[panic transaction]]></category>
		<category><![CDATA[RBF]]></category>
		<category><![CDATA[replace by fee]]></category>
		<category><![CDATA[satoshi]]></category>
		<category><![CDATA[transaction fee]]></category>
		<category><![CDATA[UTXO]]></category>
		<category><![CDATA[wallet bug]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=39862</guid>

					<description><![CDATA[<p>Shortly after midnight UTC on April 8, a Bitcoin user mistakenly paid 0.75 BTC ($70,500) in transaction fees due to a panic-driven use of replace-by-fee (RBF). The transaction was the user’s second attempt to push a prior transaction through by raising the fee and changing the destination address. In the final version, a newly added</p>
<p>The post <a href="https://coinengineer.net/blog/panicked-bitcoiner-loses-over-70k-in-rbf-fee-error/">Panicked Bitcoiner Loses Over $70K in RBF Fee Error!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="4685" data-end="5107">Shortly after midnight UTC on April 8, a <strong data-start="4726" data-end="4737">Bitcoin</strong> user mistakenly paid <strong data-start="4759" data-end="4771">0.75 BTC</strong> ($70,500) in transaction fees due to a panic-driven use of <strong data-start="4831" data-end="4855">replace-by-fee (RBF)</strong>. The transaction was the user’s second attempt to push a prior transaction through by raising the fee and changing the destination address. In the final version, a newly added unspent transaction output (UTXO) ended up being included fully in the fee.</p>
<p class="" data-start="5109" data-end="5454">The initial transaction used a &#8220;default or conservative&#8221; fee setting. The user’s first RBF attempt doubled the fee and altered the output address. But instead of confirming either of these transactions, a final RBF with a dramatically higher fee overrode them, causing the entire amount of the change — 0.75 BTC — to be included as miner reward.</p>
<p data-start="5109" data-end="5454"><img decoding="async" class="aligncenter wp-image-152984 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/bitcoin.jpg" alt="bitcoin" width="1280" height="539" /></p>
<h2 data-start="5461" data-end="5509">Satoshi Error or Bug in Wallet Script?</h2>
<p class="" data-start="5510" data-end="5793">According to <strong data-start="5523" data-end="5537">Anmol Jain</strong>, VP of Investigations at <strong data-start="5563" data-end="5573">AMLBot</strong>, the user may have made a simple yet costly mistake in fee calculation. Jain suggested the user likely meant to enter <strong data-start="5692" data-end="5707">30.5692 sat</strong>, but accidentally typed <strong data-start="5732" data-end="5747">305,692 sat</strong> — or confused <strong data-start="5762" data-end="5772">sat/vB</strong> with total satoshis.</p>
<p class="" data-start="5795" data-end="6051">Another theory is that an automated wallet script contained a miscalculation. Some wallets allow fee settings in <strong data-start="5908" data-end="5919">sats/vB</strong>, and such confusion can arise if the system interprets a small value as too low and prompts the user to increase it. Jain explains:</p>
<p class="" data-start="5795" data-end="6051"><em><span style="font-size: 14.4px;">“User types 305000 thinking it’s 30.5 sat/vB, but the wallet applies 305,000 sat/vB — which is insane.”</span></em></p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<p class="" data-start="6160" data-end="6438">The mistake caused the wallet to treat a full UTXO of nearly 0.75 BTC as a transaction fee, likely due to not properly updating the change address or misreading the transaction structure. Both earlier transactions remained unconfirmed while the highest-fee version went through.</p>
<h2 data-start="6445" data-end="6495">RBF: Flexible Feature or Dangerous Tool?</h2>
<p class="" data-start="6496" data-end="6738"><strong data-start="6496" data-end="6514">Replace-by-fee</strong> is a controversial but core feature in <strong data-start="6554" data-end="6565">Bitcoin</strong>. It allows users to replace unconfirmed transactions with higher-fee versions. Miners, motivated by profit, are expected to confirm the version that offers a higher reward.</p>
<p class="" data-start="6740" data-end="6975">This mechanism has sparked debate. In 2019, <strong data-start="6784" data-end="6800">Bitcoin Cash</strong> advocate <strong data-start="6810" data-end="6825">Hayden Otto</strong> claimed RBF enabled double-spending. Bitcoin Cash removed RBF support and claimed unconfirmed transactions on its network were final and trustworthy.</p>
<p class="" data-start="6977" data-end="7144">Despite this, RBF-like behaviors have occurred on <strong data-start="7027" data-end="7043">Bitcoin Cash</strong> as well, showing that this feature is more a result of blockchain dynamics than a standalone switch.</p>
<hr />
<p class="" data-start="7205" data-end="7550"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/panicked-bitcoiner-loses-over-70k-in-rbf-fee-error/">Panicked Bitcoiner Loses Over $70K in RBF Fee Error!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/panicked-bitcoiner-loses-over-70k-in-rbf-fee-error/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/04/bitcoin-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/04/bitcoin-2.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
