Security News > 2024 > March > PixPirate Android malware uses new tactic to hide on phones
The latest version of the PixPirate banking trojan for Android employs a new method to hide on phones while remaining active, even if its dropper app has been removed.
PixPirate is a new Android malware first documented by the Cleafy TIR team last month seen targeting Latin American banks.
A new report by IBM explains that contrary to the standard tactic of malware attempting to hide its icon, which is possible on Android versions up to 9, PixPirate does not use a launcher icon.
The first app is known as a 'downloader' and is distributed through APKs that are spread via phishing messages sent on WhatsApp or SMS. This downloader app requests access to risky permissions upon installation, including Accessibility Services, and then proceeds to download and install the second app, which is the encrypted PixPirate banking malware.
Anatsa Android malware downloaded 150,000 times via Google Play.
New 'Gold Pickaxe' Android, iOS malware steals your face for fraud.
News URL
Related news
- Free VPN apps on Google Play turned Android phones into proxies (source)
- Vultur banking malware for Android poses as McAfee Security app (source)
- Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals (source)
- Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies (source)
- SoumniBot malware exploits Android bugs to evade detection (source)
- New Brokewell malware takes over Android devices, steals data (source)
- New 'Brokewell' Android Malware Spread Through Fake Browser Updates (source)