Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

March 14, 2026

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

March 14, 2026

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

March 14, 2026
Facebook X (Twitter) Instagram
Saturday, March 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»PixRevolution Malware Hijacks Brazil’s PIX Transfers in Real Time
News

PixRevolution Malware Hijacks Brazil’s PIX Transfers in Real Time

Team-CWDBy Team-CWDMarch 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified Android banking trojan capable of hijacking Brazil’s instant payment transfers, targeting one of the country’s most widely used financial systems, has been uncovered by security researchers.

The malware, known as PixRevolution, silently monitors victims’ smartphones and redirects funds during PIX transactions, according to a new analysis from mobile security firm Zimperium.

Brazil’s PIX platform, introduced in 2020 by the Central Bank of Brazil, allows instant payments that settle within seconds. The system has transformed the country’s financial landscape, with more than 76% of Brazilians using it and over three billion transactions processed each month.

The researchers said PixRevolution exploits the speed and irreversibility of those transfers. Once a PIX payment is completed it cannot be reversed, making it an attractive target for financial cybercrime.

Real-Time Payment Hijacking

The trojan remains hidden on a victim’s device until a PIX transaction is initiated. When a user enters the recipient’s payment key and confirms the transfer, the malware briefly displays a loading screen reading “Aguarde…”, Portuguese for “please wait.”

Behind the scenes, however, the malware replaces the recipient’s key with one controlled by attackers. The transaction completes as normal, leaving the victim unaware that the funds were redirected.

Unlike many banking trojans that rely on automated scripts, PixRevolution uses what researchers called an “agent-in-the-loop” model. A remote operator watches the victim’s phone screen in near real time and intervenes at the exact moment a payment is processed.

Read more on financial cybercrime: Authorized Push Payment Fraud a National Security Risk to UK, Report Finds

Zimperium said the malware relies on several coordinated techniques:

  • Continuous monitoring through Android accessibility permissions

  • Live screen streaming to an attacker-controlled command server

  • Keyword detection to identify financial transactions

  • A fake loading overlay that hides the moment payment details are replaced

The entire manipulation takes only seconds and leaves little indication that anything unusual occurred.

Fake Apps Used to Spread Malware

Zimperium warned that the campaign spreads through fraudulent download pages designed to resemble the official Google Play store. These sites imitate real app listings, complete with descriptions, ratings and installation buttons. Instead of redirecting to the genuine store, the button downloads a malicious Android file.

Researchers identified multiple samples impersonating well-known Brazilian services, including travel platforms, postal services, investment apps and antivirus software.

After installation, users are prompted to enable an accessibility service called “Revolution.” The onboarding page claims the permission is required to activate app features and reassures users that no personal information is collected.

Once granted, however, the trojan gains extensive access to the device, including the ability to read screen content and simulate taps.

With more than 150 million PIX users in Brazil and billions of monthly transactions, researchers warn that even a small success rate for attacks like PixRevolution could lead to significant financial losses.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew RFP Template for AI Usage Control and AI Governance 
Next Article Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Team-CWD
  • Website

Related Posts

News

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

March 14, 2026
News

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

March 14, 2026
News

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

March 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

How it preys on personal data – and how to stay safe

October 23, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.