Fake government and Starlink apps used in malware campaign targeting Brazil
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是研究人员发现了一种新的安卓恶意软件,叫做BeatBanker。它能窃取银行凭证,篡改加密货币交易,还能偷偷挖矿。主要影响巴西的设备。 传播方式是通过伪装成合法应用的假应用,比如Starlink和INSS Reembolso,这些应用来自伪装成Google Play的网站。一旦安装,就会偷偷挖Monero币,并且监控电池和用户活动来隐藏自己。 还有一个特别的技术,就是播放几乎听不见的声音文件,防止系统关闭应用。此外,BeatBanker还带有银行木马模块,篡改转账地址。还有一个变种使用假Starlink应用传播远程控制木马BTMOB。 所有感染都发生在巴西,可能通过WhatsApp和钓鱼页面传播。总结时要包括这些关键点:恶意软件名称、功能、传播方式、技术手段、影响地区等。 现在把这些信息浓缩到100字以内。确保涵盖主要功能、传播途径、技术细节和影响范围。 </think> 研究人员发现了一种名为BeatBanker的新Android恶意软件,在巴西感染设备后可窃取银行凭证、篡改加密货币交易并秘密挖掘Monero币。该恶意软件通过伪装成Starlink和INSS Reembolso等合法服务的应用传播,并使用音频文件保持运行以避免被终止。它还带有银行木马模块和远程控制功能,所有感染均在巴西被发现。 2026-3-12 13:15:46 Author: therecord.media(查看原文) 阅读量:6 收藏

Researchers discovered new Android malware capable of stealing banking credentials, tampering with cryptocurrency transactions and secretly mining digital currency on infected devices in Brazil.

The malware, dubbed BeatBanker by Russian cybersecurity firm Kaspersky, infects smartphones through fake applications that mimic legitimate services, including the Starlink satellite internet app and the Brazilian government portal INSS Reembolso. Both apps were available for download from a website masquerading as the official Google Play Store.

Once installed, the malware secretly mines the cryptocurrency Monero, draining the victim’s phone battery and processing power while also stealing banking credentials and manipulating cryptocurrency transactions, Kaspersky said in a report earlier this week.

The malware monitors factors such as battery temperature, battery level and user activity to determine when to start or stop the mining process, helping it remain undetected.

To maintain persistence on compromised devices, the malware uses an unusual technique: it continuously plays a nearly inaudible audio file so that the Android system does not terminate the application due to inactivity. Kaspersky noted that the audio file contains several Chinese words but did not attribute the campaign to a specific threat actor.

Beyond mining cryptocurrency, BeatBanker also deploys a banking trojan designed to manipulate digital asset transfers. When victims attempt to send USDT using apps such as Binance or Trust Wallet, the malware overlays the transaction screen with a realistic interface that replaces the intended destination wallet address with one controlled by the attackers.

Researchers also identified another variant of the campaign that uses a fake Starlink application as a lure. In that case, the malware delivers BTMOB, an Android remote-access trojan sold through a malware-as-a-service model.

Once installed, BTMOB gives attackers full remote control of the victim’s phone, including access to the camera, keystrokes, GPS location and other sensitive data. Researchers believe the creators of BeatBanker likely purchased the BTMOB malware from its developers and integrated it into their campaign, replacing the banking module used in earlier infections.

All observed infections linked to BeatBanker were detected in Brazil. Some samples distributing the BTMOB payload appeared to spread through WhatsApp messages and phishing pages.

Android trojans are widely used by cybercriminals to steal sensitive data and financial information. In recent months, researchers have identified other mobile threats, including Herodotus, a banking trojan capable of mimicking human behavior to evade detection, and Crocodilus, which manipulates victims’ contact lists to impersonate trusted phone numbers and bypass bank fraud protections.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/fake-gov-apps-malware-android-brazil
如有侵权请联系:admin#unsafe.sh