Mirax Android Trojan Turns Devices Into Residential Proxy Nodes

Mirax Android Trojan Turns Devices Into Residential Proxy Nodes

Infosecurity Magazine
Infosecurity MagazineApr 13, 2026

Companies Mentioned

Why It Matters

Mirax combines credential theft with proxy abuse, giving cybercriminals a dual‑use platform that amplifies financial fraud and anonymized attacks, raising the risk profile for mobile users and enterprises worldwide.

Key Takeaways

  • Mirax infects Android devices via fake streaming app ads.
  • Over 200,000 Spanish‑speaking accounts targeted in Europe.
  • Malware‑as‑a‑Service limits access to select affiliates.
  • Infected phones act as residential proxy nodes for fraud.
  • Real‑time overlays and keylogging harvest banking credentials.

Pulse Analysis

The emergence of Mirax underscores a broader shift in mobile malware toward modular, service‑oriented architectures. Traditional Android trojans focused on single‑purpose data theft, but Mirax’s MaaS framework offers affiliates a ready‑made toolkit that can be customized on demand. By leveraging social‑media ads and counterfeit IPTV apps, the operators achieve rapid, large‑scale distribution while evading app‑store vetting. This approach mirrors trends seen in desktop ransomware, where affiliate ecosystems accelerate threat proliferation and complicate attribution.

What sets Mirax apart is its built‑in residential proxy capability. Infected smartphones become legitimate‑looking IP endpoints, allowing attackers to route fraudulent transactions, scrape price‑sensitive data, or launch anonymized attacks without triggering geo‑blocking or anti‑fraud filters. The proxy layer also masks the true origin of command‑and‑control traffic, making network‑based detection far more challenging. Coupled with real‑time overlay injection and continuous keylogging, the trojan can harvest banking credentials, PIN structures, and even biometric usage patterns, delivering a comprehensive credential‑stealing suite.

Security teams must adapt by expanding mobile threat intelligence and integrating proxy‑abuse detection into their monitoring stacks. Endpoint protection should prioritize behavioral analytics that flag unusual network routing or WebSocket connections from consumer devices. Additionally, public‑private partnerships can help dismantle the MaaS supply chain by targeting the limited affiliate groups that control distribution. As Mirax eyes broader European markets, proactive user education about unofficial app downloads and rigorous app‑store vetting will be essential to curb its next wave of infections.

Mirax Android Trojan Turns Devices Into Residential Proxy Nodes

Comments

Want to join the conversation?

Loading comments...