Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Real-Time Banking Trojan Strikes Brazil’s Pix Users
    Cybersecurity

    Real-Time Banking Trojan Strikes Brazil’s Pix Users

    adminBy adminMarch 13, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Real-Time Banking Trojan Strikes Brazil's Pix Users
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A new Android-based banking Trojan is targeting mobile payments in Brazil and hijacking them on the way to their destination.

    Dubbed “PixRevolution,” the Trojan relies on the widespread use of Pix, a mobile instant payment system implemented by the Central Bank of Brazil in 2020; more than three quarters of the Brazilian population use it. Researchers from mobile security vendor Zimperium’s zLabs team identified a novel banking Trojan “specifically targeting this system and implicitly targeting most Brazilian financial institutions,” malware analyst Aazim Yaswant wrote in a blog post.

    Banking Trojans are unfortunately notorious in South America’s largest country; one known as Maverick emerged in 2024 that self-terminates if the victim is located outside Brazil. As for why these attacks are so prevalent, that’s a more complicated answer that comes down to the high use of mobile payments in the country, as well as other complexities in the Latin American security landscape. 

    Related:Xygeni GitHub Action Compromised Via Tag Poison

    That said, it’s worth noting that mobile attacks are an attractive target globally, and have only become increasingly so in recent years. 

    Kern Smith, VP of global solutions engineering at Zimperium, tells Dark Reading that Brazil is an appealing target to attackers because it has one of the most advanced mobile banking ecosystems in the world.

    “Large numbers of users rely on mobile apps for everyday banking and payments, creating a high-value attack surface,” he says. “Many regional cybercrime groups have also specialized in banking malware for years and have adapted those techniques to mobile devices as financial activity shifted to smartphones.”

    The PixRevolution Difference: AI Agents and Precise Timing Windows

    What makes PixRevolution stand out compared to other mobile malware is that the malware sits stealthily on the device until the victim initiates a Pix payment. When they do, a human or AI agent attacker actively observes and acts at the moment of transaction, diverting the payment to a criminal entity instead.  

    Initial access involves trickery and social engineering, as expected. The threat actors behind the campaign made fake Google Play Store pages hosted on their own domains and posing as trusted brands like Expedia or local services such as the post office. They are “perfect replicas,” Yaswant wrote; when someone who stumbles on such a page attempts to download an app from the official Play Store, they instead download a malicious Android package kit (APK) file. 

    That APK file registers a new Android accessibility option called “Enable Revolution,” but this is not a legitimate feature. Rather, when launching the app, the malware tells the user to activate the accessibility feature for application functionality (and not data collection) reasons. But when they do that, the Trojan completely takes over the device. It has access to taps, swipes, all on-screen text, and all audio that reaches the microphone. 

    Related:Microsoft Patches 83 CVEs in March Update

    The Trojan also establishes a command-and-control (C2) server through port 9000 and gives the operator access to real-time screen capture with little delay. This gives the threat actor full visibility into what the device sees, enabling them to hijack a bank transfer the moment it happens. Furthermore, the malware has access to a list of more than 80 Portuguese words referring to bank transfers and financial transactions that it checks against every time new text appears on the screen.

    Finally, in the moment when the victim attempts to send a payment, the attacker puts up an HTML overlay telling them to please wait (Aguarde…) while the hijack takes place behind the scenes. The final step in the attack takes mere seconds from the victim’s point of view. 

    How to Defend Against PixRevolution

    Yaswant said PixRevolution marks an evolution in mobile financial fraud, combining real-time operators and traditional malware into a novel, precise attack.

    Related:‘Overly Permissive’ Salesforce Cloud Configs in the Crosshairs

    “This malware family sidesteps the traditional arms race between automated Trojans and banking app defenses. It does not need to reverse-engineer each bank’s UI,” the analyst said. “It does not need to maintain a list of target applications. It does not need to guess when a transaction is happening. It simply watches and then acts.”

    Smith tells Dark Reading that in order to combat malware like PixRevolution, organizations “need to recognize that many of these attacks now originate on the mobile device itself.”

    “When malware compromises the device, attackers can intercept authentication codes or manipulate legitimate banking sessions while appearing to be the real user,” he says. “Financial institutions should incorporate mobile threat visibility into their fraud detection and authentication workflows to identify compromised devices before fraudulent transactions occur.”

    Banking Brazils Pix RealTime strikes Trojan Users
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI stopped troubleshooting Wi-Fi with basic speed tests, and started using one diagnostic tool nobody mentions
    Next Article Meta is developing more AI chips for itself
    admin
    • Website

    Related Posts

    Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

    March 14, 2026

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    March 14, 2026

    Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls

    March 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

    March 14, 2026

    Only 15% of pages retrieved by ChatGPT appear in final answers: Report

    March 14, 2026

    Google Messages is better than ever, but it still leaves me frustrated

    March 14, 2026

    New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids

    March 14, 2026
    Categories
    • Blogging (40)
    • Cybersecurity (771)
    • Privacy & Online Earning (120)
    • SEO & Digital Marketing (485)
    • Tech Tools & Mobile / Apps (943)
    • WiFi / Internet & Networking (129)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

    March 14, 2026

    Only 15% of pages retrieved by ChatGPT appear in final answers: Report

    March 14, 2026

    Google Messages is better than ever, but it still leaves me frustrated

    March 14, 2026
    Most Popular
    • Critical HPE AOS-CX Vulnerability Allows Admin Password Resets
    • Only 15% of pages retrieved by ChatGPT appear in final answers: Report
    • Google Messages is better than ever, but it still leaves me frustrated
    • New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids
    • Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
    • ‘Current’ Fixes My Biggest Issues With RSS Readers
    • Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls
    • FBI seeks victims of Steam games used to spread malware
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.