Home OSINT News Signals
CRYPTO

Six New Android Malware Families Target Financial Transactions, Posing Severe Threat to Mobile Banking and Crypto Assets

🕓 2 min read

Cybersecurity researchers have identified a cluster of six distinct Android malware families engineered to exfiltrate sensitive data from infected devices and execute sophisticated financial fraud. This discovery underscores a significant escalation in mobile threats, moving beyond simple data theft to real-time transaction hijacking. The malware families include traditional banking trojans such as PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT, alongside more advanced remote administration tools like SURXRAT. These threats collectively target a wide array of financial vectors, including national instant payment platforms, traditional banking applications, and cryptocurrency wallets, posing a grave risk to users' financial security.

A particularly alarming strain, dubbed PixRevolution, has been designed to specifically target Brazil's widely adopted Pix instant payment platform. According to analysis by mobile security firm Zimperium, this malware operates with a high degree of stealth, lying dormant until a victim initiates a Pix transfer. At that critical moment, it springs into action. Security researcher Aazim Yaswant highlighted the malware's novel operational model, stating, "What distinguishes this threat from conventional banking trojans is its fundamental design: a human or AI agent operator is actively engaged on the remote end, observing the victim's phone screen instantaneously, poised to act at the precise moment of transaction." This real-time, human-in-the-loop approach allows attackers to dynamically intercept and reroute payments to accounts they control.

The infection chain for these malware families typically begins with social engineering. Threat actors create counterfeit listings on the official Google Play Store, impersonating legitimate applications from trusted entities like Expedia, Sicredi, and Correios. Unsuspecting users who download these apps are tricked into installing malicious dropper APK files. Once installed, the applications aggressively prompt users to enable Android's Accessibility Services, a critical permission that grants the malware extensive control over the device's interface and functions. To maintain persistence and communication, the malware establishes a connection to a command-and-control (C2) server over TCP port 9000, sending regular heartbeat messages containing device metadata and activating real-time screen capture capabilities via the Android MediaProjection API.

The core malicious functionality of PixRevolution exemplifies the threat's sophistication. It continuously monitors the victim's screen, waiting for the specific UI elements associated with a Pix transaction. When a victim enters the payment amount and the recipient's Pix key, the malware instantly deploys a deceptive overlay. This overlay displays a message like "Aguarde..." ("Wait" in Portuguese/Spanish), creating a false sense of a processing delay. Simultaneously, in the background, the malware surreptitiously replaces the legitimate recipient's Pix key with one belonging to the attacker. Once the fraudulent transaction is complete, the overlay disappears, leaving the victim unaware that their funds have been diverted. This seamless, real-time manipulation represents a formidable challenge for both users and security platforms, demanding heightened vigilance and advanced behavioral detection mechanisms to counter.

Telegram X LinkedIn
Back to News