Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Threatens Pix Payments and Banking Apps

New Android Malware Threatens Pix Payments and Banking Apps

Posted on March 12, 2026 By CWS

Security experts have identified six new families of Android malware designed to steal data and execute financial fraud. These malware variants include PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, Oblivion RAT, and SURXRAT. Each operates with unique methods to target financial transactions and user data.

Malware Targeting Pix Payments

PixRevolution is a significant threat to Brazil’s Pix payment system. As per Zimperium, this malware intercepts transactions, redirecting funds to attackers. It operates covertly until a Pix transaction is initiated, at which point it employs a human or AI operator to alter the transaction details.

The malware tricks users by mimicking legitimate apps like Expedia and Sicredi on fake Google Play Store pages. Once installed, these apps request accessibility permissions to manipulate transactions and gather device data. PixRevolution’s primary function is to monitor screens and create overlays to deceive users, ultimately altering the recipient’s Pix key during transactions.

BeatBanker: An Evolving Threat

BeatBanker targets Brazilian users through phishing campaigns posing as Google Play Store sites. Notably, it uses a unique persistence strategy involving an audio loop to maintain its presence. The malware employs Google’s Firebase Cloud Messaging for command-and-control operations.

This malware incorporates a cryptocurrency miner and can hijack devices to spoof screens during USDT transactions. By monitoring various web browsers, it gathers personal information and controls devices remotely. Recent developments reveal BeatBanker deploying BTMOB RAT for enhanced control and surveillance capabilities.

Advanced Malware Techniques

TaxiSpy RAT exploits Android’s accessibility services to gather sensitive information, targeting Russian apps for credential theft. Using advanced evasion methods, it captures SMS, call logs, and more, leveraging Firebase for remote commands.

Mirax and Oblivion RAT have emerged as malware-as-a-service offerings, with Mirax advertising banking overlays and information gathering. Oblivion promises to bypass security features across major manufacturers, presenting a significant challenge to Android’s defenses.

SURXRAT, a commercial malware, uses accessibility permissions for persistent control, communicating with a Firebase-based infrastructure. Some samples even integrate AI elements, expanding their capabilities further.

The evolution of these malware families underscores ongoing attempts by cybercriminals to enhance their tools and exploit new technologies, posing a continuous threat to Android users worldwide.

The Hacker News Tags:Android malware, banking apps, BeatBanker, Cybersecurity, financial fraud, malware families, Mirax, Oblivion RAT, Pix payments, PixRevolution, SURXRAT, TaxiSpy RAT

Post navigation

Previous Post: GitLab Security Alert: Critical XSS and DoS Flaws Fixed
Next Post: Hackers Exploit Cloudflare to Target Microsoft 365 Users

Related Posts

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors The Hacker News
CISA Highlights Exploited Roundcube Vulnerabilities CISA Highlights Exploited Roundcube Vulnerabilities The Hacker News
Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software The Hacker News
A Critical Part of Enterprise AI Governance A Critical Part of Enterprise AI Governance The Hacker News
Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution The Hacker News
1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Severe N8n Vulnerabilities Risked Server Control
  • Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention
  • Cisco Addresses Critical IOS XR Security Flaws
  • Apple Enhances Security for Older iOS Devices Against Exploits
  • Hackers Exploit Cloudflare to Target Microsoft 365 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Severe N8n Vulnerabilities Risked Server Control
  • Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention
  • Cisco Addresses Critical IOS XR Security Flaws
  • Apple Enhances Security for Older iOS Devices Against Exploits
  • Hackers Exploit Cloudflare to Target Microsoft 365 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News