• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
pixpirate android banking trojan using new evasion tactic to target

PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users

You are here: Home / General Cyber Security News / PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users
March 13, 2024

The menace actors guiding the PixPirate Android banking trojan are leveraging a new trick to evade detection on compromised products and harvest sensitive facts from customers in Brazil.

The approach lets it to conceal the destructive app’s icon from the dwelling monitor of the victim’s unit, IBM mentioned in a complex report published nowadays.

“Thanks to this new system, during PixPirate reconnaissance and attack phases, the target stays oblivious to the malicious operations that this malware performs in the background,” security researcher Nir Somech reported.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


PixPirate, which was very first documented by Cleafy in February 2023, is acknowledged for its abuse of Android’s accessibility solutions to covertly perform unauthorized fund transfers making use of the PIX immediate payment platform when a qualified banking app is opened.

The frequently mutating malware is also capable of stealing victims’ online banking credentials and credit rating card information and facts, as very well as capturing keystrokes and intercepting SMS messages to access two-factor authentication codes.

Cybersecurity

Usually distributed through SMS and WhatsApp, the attack circulation involves the use of a dropper (aka downloader) app that is engineered to deploy the most important payload (aka droppee) to pull off the money fraud.

“Typically, the downloader is made use of to download and install the droppee, and from this position on, the droppee is the key actor conducting all fraudulent functions and the downloader is irrelevant,” Somech discussed.

“In the case of PixPirate, the downloader is liable not only for downloading and installing the droppee but also for functioning and executing it. The downloader performs an active aspect in the destructive functions of the droppee as they connect with each individual other and deliver commands to execute.”

The downloader APK application, once launched, prompts the target to update the application to both retrieve the PixPirate component from an actor-controlled server or put in it if it’s embedded in just alone.

Android Banking Trojan

What is actually modified in the most up-to-date variation of the droppee is the absence of activity with the action “android.intent.motion.Main” and the class “android.intent.category.LAUNCHER” that makes it possible for a consumer to start an application from the house monitor by tapping its icon.

Place in different ways, the an infection chain needs both the downloader and the droppee to work in tandem, with the previous dependable for running the PixPirate APK by binding to a company exported by the droppee.

“Later, to keep persistence, the droppee is also induced to operate by the unique receivers that it registered,” Somech reported. “The receivers are set to be activated centered on distinct situations that come about in the system and not automatically by the downloader that originally brought on the droppee to operate.”

“This method will allow the PixPirate droppee to run and conceal its existence even if the target gets rid of the PixPirate downloader from their unit.”

Cybersecurity

The advancement comes as Latin American (LATAM) banks have turn into the goal of a new malware named Fakext that employs a rogue Microsoft Edge extension named SATiD to carry out male-in-the-browser and web injection attacks with the target of grabbing credentials entered in the focused lender web page.

It is really value noting that SAT ID is a service supplied by Mexico’s Tax Administration Company (SAT) to make and update digital signatures for filing taxes on the net.

In pick out situations, Fakext is engineered to show an overlay that urges the target to obtain a respectable remote access tool by purporting to be the bank’s IT assist staff, in the long run enabling the menace actors to carry out fiscal fraud.

The campaign – energetic given that at minimum November 2023 – singles out 14 banking companies operating in the region, a bulk of which are situated in Mexico. The extension has due to the fact been taken down from the Edge Insert-ons retailer.

Identified this post interesting? This article is a contributed piece from just one of our valued partners. Stick to us on Twitter  and LinkedIn to examine extra special content material we article.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «join our webinar on protecting human and non human identities in Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms
Next Post: Demystifying a Common Cybersecurity Myth demystifying a common cybersecurity myth»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.