


Perceptive Security
SOC/SIEM Consultancy

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
Published:
12 maart 2026 om 07:56:00
Alert date:
12 maart 2026 om 09:01:21
Source:
thehackernews.com
Mobile & IoT, Ransomware & Malware
Cybersecurity researchers have discovered six new Android malware families designed to steal data and conduct financial fraud. The malware families include PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, Oblivion RAT, and SURXRAT. These threats range from traditional banking trojans to full-fledged remote administration tools. The malware specifically targets Pix payments, banking applications, and cryptocurrency wallets. PixRevolution and other variants pose significant threats to mobile financial security.
Technical details
Six Android malware families discovered: PixRevolution (targets Brazil's Pix payment platform with real-time payment hijacking using human/AI agent operators), TaxiSpy RAT (targets Russian banking apps with VNC-like remote control via WebSocket), BeatBanker (uses inaudible audio loop persistence mechanism, includes cryptocurrency miner and banking trojan), Mirax (MaaS offering with banking overlays and SOCKS5 proxy), Oblivion RAT (automated permission-granting mechanism bypassing security on major manufacturers), and SURXRAT (incorporates LLM module and ransomware-style screen locker). Malware spreads via fake Google Play Store pages, abuses accessibility services and MediaProjection API, connects to external servers on TCP port 9000, uses Firebase Cloud Messaging for C2, monitors web browsers, and employs various evasion techniques including native library encryption and rolling XOR string obfuscation.
Mitigation steps:
Avoid downloading apps from unofficial sources or fake Google Play Store pages. Be cautious when granting accessibility service permissions to apps. Monitor for unusual network connections on TCP port 9000. Watch for apps requesting excessive permissions. Be alert during financial transactions for unusual loading screens or delays. Verify app authenticity before installation. Monitor for unauthorized cryptocurrency mining activity. Check battery temperature and usage patterns for anomalies. Implement mobile device management solutions to detect and prevent malicious app installations.
Affected products:
Android devices
Brazil's Pix instant payment platform
Expedia app
Sicredi app
Correios app
Binance
Trust Wallet
Chrome browser
Edge browser
Firefox browser
Brave browser
Opera browser
DuckDuckGo browser
Dolphin Browser
sBrowser
MIUI/HyperOS (Xiaomi)
One UI (Samsung)
ColorOS (OPPO)
MagicOS (Honor)
OxygenOS (OnePlus)
Free Fire MAX x JUJUTSU KAISEN (com.dts.freefiremax)
Free Fire x JUJUTSU KAISEN (com.dts.freefireth)
Russian banking apps
Russian cryptocurrency apps
Russian government apps
Related links:
https://thehackernews.com/2024/03/pixpirate-android-banking-trojan-using.html
https://zimperium.com/blog/pixrevolution-the-agent-operated-android-trojan-hijacking-brazils-pix-payments-in-real-time
https://thehackernews.com/2025/03/new-android-trojan-crocodilus-abuses.html
https://www.bcb.gov.br/en/financialstability/pix_en
https://securelist.com/beatbanker-miner-and-banker/119121/
https://thehackernews.com/2025/12/new-albiriox-maas-malware-targets-400.html
https://thehackernews.com/2023/08/syrian-threat-actor-evlf-unmasked-as.html
https://thehackernews.com/2025/11/threatsday-bulletin-cisco-0-days-ai-bug.html#new-android-rat-enters-black-market-for-500
https://zimperium.com/blog/extended-iocs-for-taxispy-android-banking-malware
https://www.cyfirma.com/research/taxispy-rat-analysis-of-taxispy-rat-russian-banking-focused-android-malware-with-full-remote-control/
https://x.com/KrakenLabs_Team/status/2029525839860163010
https://www.certosoftware.com/insights/oblivion-the-new-300-android-rat-that-beats-every-major-phone-manufacturers-security/
https://cyble.com/blog/surxrat-downloads-large-llm-module-from-hugging-face/
https://thehackernews.com/2026/02/new-zerodayrat-mobile-spyware-enables.html
Related CVE's:
Related threat actors:
IOC's:
TCP port 9000 connections, Firebase Cloud Messaging C2 infrastructure, WebSocket connections for VNC-like remote control, 5-second Chinese audio file loop, Fake Google Play Store app listing pages, Package names: com.dts.freefiremax, com.dts.freefireth, Fake overlay with 'Aguarde...' text, LLM module downloads from Hugging Face, Monero miner components
This article was created with the assistance of AI technology by Perceptive.
