Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Threatens Pix Payments and Banking Apps

New Android Malware Threatens Pix Payments and Banking Apps

Posted on March 12, 2026 By CWS

Security experts have identified six new families of Android malware designed to steal data and execute financial fraud. These malware variants include PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, Oblivion RAT, and SURXRAT. Each operates with unique methods to target financial transactions and user data.

Malware Targeting Pix Payments

PixRevolution is a significant threat to Brazil’s Pix payment system. As per Zimperium, this malware intercepts transactions, redirecting funds to attackers. It operates covertly until a Pix transaction is initiated, at which point it employs a human or AI operator to alter the transaction details.

The malware tricks users by mimicking legitimate apps like Expedia and Sicredi on fake Google Play Store pages. Once installed, these apps request accessibility permissions to manipulate transactions and gather device data. PixRevolution’s primary function is to monitor screens and create overlays to deceive users, ultimately altering the recipient’s Pix key during transactions.

BeatBanker: An Evolving Threat

BeatBanker targets Brazilian users through phishing campaigns posing as Google Play Store sites. Notably, it uses a unique persistence strategy involving an audio loop to maintain its presence. The malware employs Google’s Firebase Cloud Messaging for command-and-control operations.

This malware incorporates a cryptocurrency miner and can hijack devices to spoof screens during USDT transactions. By monitoring various web browsers, it gathers personal information and controls devices remotely. Recent developments reveal BeatBanker deploying BTMOB RAT for enhanced control and surveillance capabilities.

Advanced Malware Techniques

TaxiSpy RAT exploits Android’s accessibility services to gather sensitive information, targeting Russian apps for credential theft. Using advanced evasion methods, it captures SMS, call logs, and more, leveraging Firebase for remote commands.

Mirax and Oblivion RAT have emerged as malware-as-a-service offerings, with Mirax advertising banking overlays and information gathering. Oblivion promises to bypass security features across major manufacturers, presenting a significant challenge to Android’s defenses.

SURXRAT, a commercial malware, uses accessibility permissions for persistent control, communicating with a Firebase-based infrastructure. Some samples even integrate AI elements, expanding their capabilities further.

The evolution of these malware families underscores ongoing attempts by cybercriminals to enhance their tools and exploit new technologies, posing a continuous threat to Android users worldwide.

The Hacker News Tags:Android malware, banking apps, BeatBanker, Cybersecurity, financial fraud, malware families, Mirax, Oblivion RAT, Pix payments, PixRevolution, SURXRAT, TaxiSpy RAT

Post navigation

Previous Post: GitLab Security Alert: Critical XSS and DoS Flaws Fixed
Next Post: Hackers Exploit Cloudflare to Target Microsoft 365 Users

Related Posts

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse The Hacker News
Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation The Hacker News
WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups The Hacker News
Why Secrets in JavaScript Bundles are Still Being Missed Why Secrets in JavaScript Bundles are Still Being Missed The Hacker News
SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems The Hacker News
AI Advances in Cybersecurity Pose New Challenges AI Advances in Cybersecurity Pose New Challenges The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows RDP Cache Vulnerability: Security Risks Uncovered
  • Chinese Hacker Extradited to U.S. for COVID Cyberattacks
  • PyPI Package Compromised by Malicious Scripts
  • Spectrum Security Secures $19 Million in Funding
  • Windows Shell Vulnerability Exploited, Microsoft Confirms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows RDP Cache Vulnerability: Security Risks Uncovered
  • Chinese Hacker Extradited to U.S. for COVID Cyberattacks
  • PyPI Package Compromised by Malicious Scripts
  • Spectrum Security Secures $19 Million in Funding
  • Windows Shell Vulnerability Exploited, Microsoft Confirms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark