Home OSINT News Signals
CRYPTO

BeatBanker Android Malware Disguised as Starlink App Hijacks Devices for Banking Theft and Cryptojacking

🕓 2 min read

A sophisticated new Android malware strain, dubbed BeatBanker, is actively targeting users by masquerading as a legitimate Starlink application. Discovered by Kaspersky researchers in campaigns focused on Brazil, the malware is distributed through counterfeit websites that impersonate the official Google Play Store. The threat combines the capabilities of a banking trojan with a Monero cryptocurrency miner, enabling it to steal sensitive credentials and manipulate cryptocurrency transactions. In a significant evolution, the latest version of BeatBanker has shifted from its original banking module to deploying a commodity Android Remote Access Trojan (RAT) known as BTMOB RAT, granting attackers comprehensive control over compromised devices.

BeatBanker employs advanced evasion techniques to avoid detection and analysis. It is distributed as an APK file that utilizes native libraries to decrypt and load hidden DEX code directly into the device's memory, a method that helps it bypass static security checks. Before executing its malicious payload, the malware performs environment checks to determine if it is running in an analysis sandbox. If the coast is clear, it displays a fraudulent Google Play Store update screen, deceiving victims into granting the permissions necessary to install additional malicious components. Furthermore, BeatBanker implements a delayed execution strategy, postponing its core malicious operations for a period after installation to avoid triggering immediate security alarms.

The deployment of the BTMOB RAT module significantly escalates the threat. This RAT provides operators with a powerful suite of surveillance and control features, including full remote device control, keylogging, screen recording, access to the device's camera, GPS tracking, and credential-capture capabilities. This allows attackers to steal a wide array of personal and financial data directly from the infected smartphone. According to Kaspersky's analysis, BeatBanker also uses an unusual persistence mechanism: it continuously plays a nearly inaudible audio file to prevent the Android system from putting the malicious service to sleep, thereby ensuring it remains active on the device.

This campaign highlights the growing trend of multi-functional malware that blends financial theft with other monetization schemes like cryptojacking. The use of a legitimate brand like Starlink as a lure demonstrates attackers' continued reliance on social engineering to gain initial access. For users, this underscores the critical importance of downloading applications only from official app stores like Google Play and remaining vigilant against unsolicited prompts to install software or grant permissions from unfamiliar sources. Organizations and individuals should ensure robust mobile security solutions are in place and keep their devices' operating systems and applications updated to mitigate such evolving threats.

Telegram X LinkedIn
Back to News