Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ClickFix Integrates Old Open-Source Python S Evolves SOCKS5
May 13, 2026
Critical SandboxJS Escape Vulnerability Allows Host Takeover
May 13, 2026
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Home/Threats/Mirax Android RAT Converts Infected Phones to Proxy Nodes
Threats

Mirax Android RAT Converts Infected Phones to Proxy Nodes

A newly identified Android Remote Access Trojan (RAT), dubbed Mirax, has been observed circulating in underground criminal forums since late 2025. This sophisticated malware presents an escalating...

Emy Elsamnoudy
Emy Elsamnoudy
April 14, 2026 3 Min Read
6 0

A newly identified Android Remote Access Trojan (RAT), dubbed Mirax, has been observed circulating in underground criminal forums since late 2025. This sophisticated malware presents an escalating threat to mobile users across Europe and beyond, as detailed in

Mirax functions as a Malware-as-a-Service (MaaS) offering, rented out to criminal affiliates who run independent campaigns using a shared platform.

Unlike most open-market MaaS tools, access is intentionally limited to a small number of trusted affiliates, with preference given to Russian-speaking actors known within underground cybercrime communities.

This controlled distribution appears designed to keep the malware operating quietly for as long as possible, reducing the chances of early discovery by security researchers.

Cleafy researchers identified and actively tracked Mirax from March 2026 onward, after detecting multiple campaigns that were directed at Spanish-speaking users.

Their investigation revealed that the malware had first appeared on underground forums on December 19, 2025, with campaigns already reaching over 200,000 accounts through paid Meta advertisements across Facebook and Instagram.

Meta Advertisement reach (Source - Cleafy)
Meta Advertisement reach (Source – Cleafy)

The scale of the operation within such a short timeframe highlights how aggressively the operators moved to push the new tool.

The infection begins with a social media advertisement that leads victims to a phishing website posing as an IPTV or illegal sports streaming service.

Mirax attack chain overview (Source - Cleafy)
Mirax attack chain overview (Source – Cleafy)

Since these types of applications are not available on the Google Play Store, users are already comfortable sideloading apps from outside official channels, which makes the social engineering far easier to execute.

The dropper files are hosted on GitHub’s Releases page and updated daily with fresh package hashes to avoid hash-based detection tools, even though the application’s actual content remains unchanged between those updates. Once installed, the dropper silently decrypts and delivers the final malware payload directly onto the device.

After completing installation, the malware disguises itself as a video playback utility and immediately prompts the user to enable Accessibility Services.

Once that permission is granted, it runs entirely in the background while displaying a fake error page to the user, making it appear as though the installation had never completed.

The Residential Proxy Mechanism

One of Mirax’s most alarming capabilities is its embedded residential proxy feature, which goes far beyond what a standard banking trojan typically offers.

Using the SOCKS5 protocol and Yamux multiplexing over WebSocket channels, the malware creates a persistent proxy tunnel between the infected phone and a relay server controlled by the attackers.

Residential proxy classes (Source - Cleafy)
Residential proxy classes (Source – Cleafy)

This lets operators route their internet activity through the victim’s real residential IP address, making it appear as though the traffic is coming from an ordinary home user rather than a criminal infrastructure.

The practical impact of this is significant. With access to a victim’s residential IP address, attackers can bypass geolocation restrictions, evade fraud detection systems, and carry out attacks such as account takeovers, transaction fraud, and password spraying — all while looking like a regular home user rather than a known bad actor. Banks and platforms that rely on IP-based fraud checks are particularly exposed to this approach.

Cleafy researchers also noted that even when victims denied the Accessibility Services request, the malware could still activate its proxy module using fewer permissions, meaning operators could extract value from incomplete infections rather than abandoning those devices.

This signals a mature and deliberate monetization strategy built into the malware’s design. Android users are strongly advised to avoid downloading apps from outside the Google Play Store, especially those advertised on social media.

Periodically reviewing which apps have been granted Accessibility Services and revoking permissions for anything unrecognized can also help detect a compromise before significant damage occurs.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

PlugX USB Worm Spreads Globally via DLL Sideload Across Multiple

Next Post

Critical ShowDoc RCE Vulnerability Actively Explo Exploited Wild

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Releases Windows 11 Cumulative Update 25H
May 13, 2026
Discover the Top 10 Best Data Loss Prevention Software
May 13, 2026
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us