Blog Cybersecurity iPhone Samsung Technology Updates Windows About Contact Password Generator

New Mirax Android Malware Turns Phones Into Proxy Bots and Steals Banking

April 14, 2026 5 min read Cybersecurity

A newly discovered Android malware named Mirax is raising serious concerns in the cybersecurity world. Unlike traditional mobile threats, this malware combines banking credential theft with a powerful residential proxy system, allowing attackers to exploit infected devices in multiple ways.

📌 Quick Summary (Featured Snippet)


⚠️ What Makes Mirax Different?

Mirax stands out because it has dual functionality:

👉 It steals sensitive data (like banking credentials)
👉 It converts infected devices into proxy servers

This means attackers can:


💻 Malware-as-a-Service (MaaS) Model

Mirax operates as a Malware-as-a-Service (MaaS) platform:

👉 This controlled access makes the malware more dangerous and harder to track.


📊 Massive Campaign via Social Media

Security researchers from Cleafy discovered Mirax campaigns targeting users via:

👉 These campaigns reportedly reached over 200,000 users in a short time.


🧠 How the Attack Works

The infection chain is highly deceptive:

  1. User clicks on a social media ad
  2. Redirected to a fake streaming/phishing site
  3. Downloads an app outside official stores
  4. Installs a dropper hosted on GitHub
  5. Malware payload is silently deployed

👉 The app then disguises itself as a video player.


🔐 Abuse of Accessibility Permissions

After installation, Mirax requests:

👉 Accessibility Services permission

If granted:

Even if denied:

👉 The proxy feature can still activate with limited permissions


🌐 Residential Proxy Feature Explained

One of Mirax’s most dangerous capabilities is its built-in proxy system:

👉 This allows attackers to:


🚨 Why This Is a Big Deal

Using real residential IPs makes attacks:

👉 Banks and platforms relying on IP-based security are especially vulnerable.


🛡️ How to Stay Safe

To protect your device:


🔎 Final Thoughts

Mirax represents a new evolution in mobile malware. By combining data theft with proxy abuse, it creates a powerful monetization model for cybercriminals. As attacks become more sophisticated, user awareness and cautious behavior are more important than ever.


More Cybersecurity articles
Share: