HomeRisk ManagementsMirax Android Trojan Converts Devices into Residential Proxy Nodes

Mirax Android Trojan Converts Devices into Residential Proxy Nodes

Published on

spot_img

New Android Banking Trojan Mirax Expands Its Reach Across Europe

A recently discovered Android banking trojan known as Mirax is swiftly making its presence felt across Europe, particularly targeting Spanish-speaking users. This malware combines remote access features with the capabilities of residential proxies, significantly increasing its reach and potential impact. A detailed advisory issued by Cleafy highlights the alarming capabilities of this malware, which has reportedly affected over 200,000 accounts through targeted advertisements on social media platforms.

Cleafy emphasizes that Mirax signifies a notable shift in the development and deployment strategies of Android malware. Unlike traditional threats that are often accessible to a wider array of cybercriminals, Mirax operates under a more restrictive Malware-as-a-Service (MaaS) model. This approach limits access to a select group of affiliates, presumably to enhance operational security while maximizing the effectiveness of its campaigns.

Once a device is infected, Mirax grants attackers real-time control, enabling them to execute commands and monitor user activity. A particularly concerning aspect of this malware is its ability to deploy fake overlays on legitimate applications to siphon sensitive information. These overlays are pulled dynamically from command-and-control (C2) servers, a feature that complicates detection and mitigation efforts.

In addition to these alarming capabilities, Mirax incorporates surveillance functionalities, such as continuous keylogging and the collection of lock screen details. This information includes the structure of Personal Identification Numbers (PINs) and the utilization of biometric data. By amassing such credentials and personal information without arousing suspicion, attackers can effectively compromise users’ sensitive data.

Social Engineering Fuels Distribution Efforts

One of the key mechanisms driving Mirax’s distribution is social engineering. Attackers craft malicious advertisements promoting illegal streaming applications, luring unsuspecting users into downloading software from unauthorized sources instead of official app stores. Such tactics have proven effective in reaching vast audiences.

The distribution chain comprises several critical components:

  • Social Media Advertising: Malicious ads exploit social media platforms to connect with potential victims.
  • Fake IPTV and Streaming Apps: These applications act as carriers for the malware.
  • Frequent Updates on GitHub: The malware is often hosted on GitHub, where it receives regular updates to evade detection.
  • Evasion Techniques: Device checks are designed to circumvent automated analysis, making it harder for security systems to identify and neutralize the threat.

Upon installation, Mirax initiates a multi-stage process where hidden payloads are decrypted, and communication channels are established via WebSockets. These channels enable attackers to maintain remote control of the devices, facilitating data extraction and further malicious activities.

Proxy Capability Enhances Attack Scope

A defining characteristic of Mirax is its capability to convert infected devices into residential proxy nodes. This functionality allows cybercriminals to route malicious traffic through legitimate IP addresses, which helps them circumvent geographic restrictions and fraud detection systems.

The implications of this feature are vast. By utilizing compromised devices as part of their infrastructure, attackers can engage in a variety of cyber-criminal activities, including account takeovers (ATO) and anonymized network assaults. This broader application of the malware underscores the need for stronger protective measures and awareness among users.

Cleafy indicates that Mirax represents a broader evolution in mobile threats, where tools are becoming increasingly modular and commercially structured. With current campaigns primarily directed at Spain, cybersecurity analysts caution that the scope of this threat is likely to broaden. As operators refine their tactics and strategies, the potential for Mirax to attain a larger international footprint becomes more pronounced.

In conclusion, the emergence of Mirax highlights significant changes in the Android malware landscape. Its unique features, including remote access capabilities, dynamic overlays, and residential proxy functionality, underscore a mounting challenge for cybersecurity professionals. As campaigns evolve, both developers and users must remain vigilant against the ever-changing threat posed by sophisticated malware like Mirax. Enhanced awareness, education, and proactive security measures will be essential in combating these advanced threats, protecting users from the unseen dangers lurking in their mobile devices.

Source link

Latest articles

New Patch for Critical Security Flaws in Nginx 1.29.8 and FreeNginx Versions

Urgent Update for Web Server Administrators: New Nginx Release Addresses Critical Security Flaws Web server...

Cyber Briefing – April 13, 2026: CyberMaterial

Cybersecurity Landscape Faces New Threats Amid Regulatory Shifts This week, the cybersecurity landscape presents a...

More like this

New Patch for Critical Security Flaws in Nginx 1.29.8 and FreeNginx Versions

Urgent Update for Web Server Administrators: New Nginx Release Addresses Critical Security Flaws Web server...

Cyber Briefing – April 13, 2026: CyberMaterial

Cybersecurity Landscape Faces New Threats Amid Regulatory Shifts This week, the cybersecurity landscape presents a...