Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Threatens Pix Payments and Banking Apps

New Android Malware Threatens Pix Payments and Banking Apps

Posted on March 12, 2026 By CWS

Security experts have identified six new families of Android malware designed to steal data and execute financial fraud. These malware variants include PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, Oblivion RAT, and SURXRAT. Each operates with unique methods to target financial transactions and user data.

Malware Targeting Pix Payments

PixRevolution is a significant threat to Brazil’s Pix payment system. As per Zimperium, this malware intercepts transactions, redirecting funds to attackers. It operates covertly until a Pix transaction is initiated, at which point it employs a human or AI operator to alter the transaction details.

The malware tricks users by mimicking legitimate apps like Expedia and Sicredi on fake Google Play Store pages. Once installed, these apps request accessibility permissions to manipulate transactions and gather device data. PixRevolution’s primary function is to monitor screens and create overlays to deceive users, ultimately altering the recipient’s Pix key during transactions.

BeatBanker: An Evolving Threat

BeatBanker targets Brazilian users through phishing campaigns posing as Google Play Store sites. Notably, it uses a unique persistence strategy involving an audio loop to maintain its presence. The malware employs Google’s Firebase Cloud Messaging for command-and-control operations.

This malware incorporates a cryptocurrency miner and can hijack devices to spoof screens during USDT transactions. By monitoring various web browsers, it gathers personal information and controls devices remotely. Recent developments reveal BeatBanker deploying BTMOB RAT for enhanced control and surveillance capabilities.

Advanced Malware Techniques

TaxiSpy RAT exploits Android’s accessibility services to gather sensitive information, targeting Russian apps for credential theft. Using advanced evasion methods, it captures SMS, call logs, and more, leveraging Firebase for remote commands.

Mirax and Oblivion RAT have emerged as malware-as-a-service offerings, with Mirax advertising banking overlays and information gathering. Oblivion promises to bypass security features across major manufacturers, presenting a significant challenge to Android’s defenses.

SURXRAT, a commercial malware, uses accessibility permissions for persistent control, communicating with a Firebase-based infrastructure. Some samples even integrate AI elements, expanding their capabilities further.

The evolution of these malware families underscores ongoing attempts by cybercriminals to enhance their tools and exploit new technologies, posing a continuous threat to Android users worldwide.

The Hacker News Tags:Android malware, banking apps, BeatBanker, Cybersecurity, financial fraud, malware families, Mirax, Oblivion RAT, Pix payments, PixRevolution, SURXRAT, TaxiSpy RAT

Post navigation

Previous Post: GitLab Security Alert: Critical XSS and DoS Flaws Fixed
Next Post: Hackers Exploit Cloudflare to Target Microsoft 365 Users

Related Posts

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments The Hacker News
Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers The Hacker News
Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams The Hacker News
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection The Hacker News
Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Hacker Extradited to U.S. for COVID Cyberattacks
  • PyPI Package Compromised by Malicious Scripts
  • Spectrum Security Secures $19 Million in Funding
  • Windows Shell Vulnerability Exploited, Microsoft Confirms
  • OilRig Hides C2 Data in Images on Google Drive with Steganography

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Hacker Extradited to U.S. for COVID Cyberattacks
  • PyPI Package Compromised by Malicious Scripts
  • Spectrum Security Secures $19 Million in Funding
  • Windows Shell Vulnerability Exploited, Microsoft Confirms
  • OilRig Hides C2 Data in Images on Google Drive with Steganography

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark