CT
CyberTimes
← Back to Threat Watch
androidmalwarebanking trojanMarch 12, 2026 · CyberTimes Security Team

Six New Android Malware Families Discovered Targeting Banking Apps, Pix Payments, and Crypto Wallets in Real Time

Cybersecurity researchers have uncovered six new Android malware families actively targeting users' bank accounts, cryptocurrency wallets, and real-time payment transfers. The malware families — PixRe

Severity🟠 HIGH
CVSS Score8.5/10
ExploitedYes — active
Fix StatusCheck required
Android users worldwide, particularly those using banking apps, cryptocurrency wallets, and Brazil's Pix instant payment platform. Russian banking and government app users are also targeted by TaxiSpy RAT.

Cybersecurity researchers have uncovered six new Android malware families actively targeting users' bank accounts, cryptocurrency wallets, and real-time payment transfers. The malware families — PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, Oblivion RAT, and SURXRAT — represent a significant escalation in mobile financial fraud, combining traditional banking trojan capabilities with full remote access tools, real-time screen surveillance, and sophisticated evasion techniques designed to make the theft completely invisible to victims. What makes this wave particularly dangerous is that several of these families intercept transactions at the exact moment they are happening — not after the fact — making recovery nearly impossible. If you use a banking app, make Pix transfers, or hold cryptocurrency on your Android phone, this is a direct threat to your finances.


Affected products

  • ·Android devices running any version with Accessibility Services enabled
  • ·Brazil's Pix instant payment platform users
  • ·Banking and cryptocurrency wallet apps globally
  • ·Russian banking, cryptocurrency, and government apps (TaxiSpy RAT)
  • ·Any Android device where apps were installed from outside the official Google Play Store

How to Fix

Step-by-step remediation

The single most important protective action is to never install Android apps from outside the Google Play Store. Every one of these malware families relies on convincing users to install apps from fake app store pages, phishing links, or unofficial sources. On your current Android device, go to Settings → Accessibility → Installed Services and look at every app listed there. Accessibility Service is a powerful permission that allows apps to read your screen and simulate touches — no app should have this unless you deliberately enabled it for a specific purpose like a screen reader. Remove any app you do not recognize or did not intentionally grant this access to. Similarly, check which apps have been granted permission to capture your screen — go to Settings → Apps → Special App Access → Media Projection. If you use Pix regularly, establish a habit of carefully reading the recipient Pix key on the confirmation screen before every transfer, not just the amount. PixRevolution relies on users not verifying this detail at the final confirmation step.


What happened

The most technically sophisticated of the six is PixRevolution, which specifically targets Brazil's Pix instant payment system — a platform processing billions of transactions daily. The malware operates silently on an infected device until the victim initiates a Pix transfer. At the critical moment when the victim enters the recipient's Pix key and the transfer amount, PixRevolution displays a fake loading screen that says "Aguarde" — Portuguese for "wait" — while quietly replacing the recipient's Pix key with one controlled by the attacker. The victim then sees a legitimate-looking transfer confirmation screen in the real Pix app. From their perspective, nothing unusual happened. The money is gone, the transfer shows as complete, and because Pix transfers are instant and final, recovering the funds is extraordinarily difficult. TaxiSpy RAT takes a broader approach, targeting Russian banking, cryptocurrency, and government apps by combining banking trojan functionality with full remote access capabilities — collecting SMS messages, contacts, call logs, clipboard contents, keystrokes, lock screen PINs, and installed app lists, while also enabling real-time VNC-like remote control of the device via WebSocket. BeatBanker, which spreads primarily through phishing sites disguised as the Google Play Store, uses one of the most unusual persistence mechanisms seen in mobile malware — it plays an almost inaudible looping audio file featuring Chinese words to prevent the malware process from being terminated by the operating system, while simultaneously running a hidden Monero cryptocurrency miner on the victim's device.

Real-World Impact

These six malware families collectively represent a new phase in mobile financial crime. The shift from stealing credentials after the fact to intercepting live transactions at the moment of execution is a meaningful escalation. A victim who has their banking password stolen can change it and recover. A victim whose Pix transfer is silently redirected at the confirmation screen loses real money instantly, with no way to reverse the transaction. The abuse of Android's Accessibility Service is central to how most of these families operate — it gives malware the ability to read everything on screen, simulate user taps, and overlay fake UI elements on top of legitimate apps, all while appearing to be a trusted system feature. For cryptocurrency users the threat is equally serious — clipboard monitoring means that whenever a user copies a wallet address to paste into a transaction, the malware can silently swap it for an attacker-controlled address before it is pasted, redirecting funds to criminals without any visible indication.

Technical Details

PixRevolution connects to an external server over TCP on port 9000 to send periodic heartbeat messages containing device information and activates real-time screen capture using Android's MediaProjection API to monitor the victim's screen. When a Pix transfer is initiated, it serves a fake WebView overlay while replacing the recipient Pix key in the background, then removes the overlay and shows a legitimate confirmation screen, leaving no visible trace. TaxiSpy RAT uses native library encryption, rolling XOR string obfuscation, and real-time VNC-like remote control via WebSocket to evade detection while enabling full device surveillance. It receives commands via Firebase push messages, making its command-and-control channel blend in with legitimate app traffic. BeatBanker uses Google's Firebase Cloud Messaging for command-and-control and incorporates runtime checks for emulated or analysis environments, battery temperature and percentage monitoring, and the unusual audio-based persistence mechanism to survive process termination. SURXRAT is classified as a full remote administration tool rather than a traditional banking trojan, providing attackers with comprehensive device control beyond financial fraud capabilities.

🛡️ Prevention Tips

Android's Accessibility Service has become the most abused feature in mobile malware because it provides near-complete control over a device once granted. Treat any app requesting Accessibility Service access with extreme suspicion — legitimate apps that need this permission are rare and include only screen readers, switch access tools for people with disabilities, and a small number of well-known productivity apps. Never grant this permission to banking apps, utility apps, or anything that was not installed directly from the official Google Play Store. Keep your Android security patches up to date — Google's monthly Android security bulletins address the underlying vulnerabilities that make these attacks more effective. For cryptocurrency specifically, avoid keeping significant holdings in mobile wallets. Hardware wallets that require physical button confirmation for every transaction cannot be silently hijacked by screen-based malware because the transaction authorization happens offline.


FAQs

I only install apps from the Google Play Store. Am I safe?

Significantly safer, yes. All six malware families primarily spread through fake app store pages and phishing links that impersonate the Play Store. However, staying on the official Play Store alone is not a complete guarantee — also regularly audit which apps have Accessibility Service and screen capture permissions granted, as these are the key capabilities these malware families abuse.


How does PixRevolution steal money without me noticing?

It waits until the exact moment you initiate a Pix transfer and enter the recipient's Pix key. At that point it displays a fake "loading" screen over your real banking app while silently replacing the recipient's Pix key with one controlled by the attacker. When the loading screen disappears you see a normal transfer confirmation. The money leaves your account and goes to the attacker. The only way to catch it is to carefully verify the recipient Pix key on the final confirmation screen before approving every transfer.


Does this affect iPhones?

No. All six malware families are Android-specific. iOS does not have an equivalent to Android's Accessibility Service in its current form, and the closed nature of the App Store and iOS app sandboxing makes this class of attack significantly harder to execute on iPhone.


Read Next