Security Researchers Uncover Six Android Malware Families Targeting Financial Apps And Digital Wallets

Published:

security researchers have identified six sophisticated Android malware families designed to compromise mobile devices and execute unauthorized financial transactions across banking applications and cryptocurrency wallets. These malicious programs, which include PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, Oblivion RAT, and SURXRAT, demonstrate a significant shift in how mobile threats operate. According to findings from Zimperium, PixRevolution specifically targets Brazil’s Pix instant payment platform by hijacking money transfers in real time. Unlike traditional banking trojans that operate autonomously, this strain often involves a human or AI operator observing the victim’s screen through the MediaProjection API. By using fake WebView overlays that mimic legitimate system delays, the malware replaces the intended recipient’s key with the attacker’s information, ensuring the funds are diverted before the user can notice any discrepancy. Because these transfers are instant, victims often only realize the theft long after the transaction is finalized.

Another prominent threat discovered by Kaspersky is BeatBanker, which primarily spreads through phishing websites disguised as official Google Play Store pages. This malware utilizes an unusual persistence mechanism by looping an almost inaudible audio file to prevent the system from terminating its background processes. Beyond monitoring banking activity, BeatBanker incorporates a cryptocurrency miner and creates deceptive overlay pages for popular platforms like Binance and Trust Wallet. When a user attempts a USDT transaction, the malware covertly replaces the destination address with one controlled by the threat actor. Recent iterations of this campaign have also been linked to the distribution of BTMOB RAT, an evolution of older families like CraxsRAT and SpySolr. This particular tool provides operators with comprehensive remote control and surveillance capabilities, allowing for the collection of personal information and complete device hijacking through commands received via Firebase Cloud Messaging.

The malware landscape has further expanded through the rise of Malware-as-a-Service (MaaS) offerings, such as Mirax and Oblivion RAT, which are marketed on various dark web and Telegram forums. Mirax is advertised as a private service that offers banking overlays, keystroke logging, and SOCKS5 proxy support to mask malicious traffic. Oblivion RAT stands out for its claimed ability to bypass automated permission restrictions on devices from major manufacturers like Samsung, Xiaomi, and OnePlus without requiring user interaction. By exploiting accessibility services, these tools gain deep persistence on the latest Android versions, posing a direct challenge to platform level defenses. Similarly, TaxiSpy RAT combines traditional banking trojan features with full remote access capabilities to target Russian banking and government applications. It employs advanced evasion techniques, including native library encryption and rolling XOR string obfuscation, to remain undetected by standard security signatures while performing real time remote control via WebSockets.

Technical analysis by firms like Cyble and CYFIRMA suggests that threat actors are now experimenting with Large Language Model (LLM) components to enhance their surveillance and operational effectiveness. For instance, SURXRAT, an improved version of the Arsink malware, has been observed triggering LLM modules when specific gaming applications are active on a device. This evolution indicates that developers are actively integrating emerging technologies to automate tasks and evade detection. Some samples of SURXRAT even include ransomware style screen lockers that allow remote operators to deny users access to their devices until a payment is made. As these frameworks continue to be repurposed and expanded, the speed of malware development cycles is accelerating, making it increasingly difficult for regulators like PTA or industry bodies like PASHA to provide immediate countermeasures against such rapidly evolving digital threats. This persistent innovation in mobile malware underscores the critical need for robust, multi layered security protocols for all mobile users.

Follow the SPIN IDG WhatsApp Channel for updates across the Smart Pakistan Insights Network covering all of Pakistan’s technology ecosystem. 

Related articles

spot_img