Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Tuesday recap

NewsDealsSocialBlogsVideosPodcasts
HomeTechnologyCybersecurityNewsNew BeatBanker Android Malware Poses as Starlink App to Hijack Devices
New BeatBanker Android Malware Poses as Starlink App to Hijack Devices
CybersecurityDefense

New BeatBanker Android Malware Poses as Starlink App to Hijack Devices

•March 10, 2026
0
BleepingComputer
BleepingComputer•Mar 10, 2026

Companies Mentioned

Kaspersky

Kaspersky

Google

Google

GOOG

Starlink

Starlink

Why It Matters

The malware’s multi‑vector approach threatens both financial assets and device performance, highlighting the growing convergence of banking fraud and crypto‑mining in mobile threats. Its stealthy persistence and legitimate‑looking disguise raise the bar for detection, urging enterprises and users to tighten Android security controls.

Key Takeaways

  • •BeatBanker disguises as Starlink app on fake Play Store.
  • •Combines banking trojan, Monero mining, and BTMOB RAT.
  • •Uses MP3 playback to keep service alive and avoid suspension.
  • •Targets Brazilian users, may spread globally.
  • •Leverages Firebase messaging to control mining based on device state.

Pulse Analysis

The appearance of BeatBanker underscores a troubling trend: cybercriminals are increasingly leveraging popular consumer brands to distribute malicious Android code. By mimicking the official Starlink application and hosting the APK on sites that imitate the Google Play Store, attackers exploit users’ trust in familiar services. This social‑engineering vector bypasses traditional app‑store vetting, forcing security teams to broaden their threat‑intelligence feeds and monitor third‑party download portals, especially in regions like Brazil where the campaign originated.

From a technical perspective, BeatBanker is a hybrid threat platform. It embeds a banking trojan for credential harvesting, integrates the BTMOB remote‑access trojan for full device control, and deploys a customized XMRig miner to siphon Monero. Evasion is achieved through native library decryption, in‑memory DEX loading, and a novel persistence mechanism that streams an inaudible MP3 to keep the process foregrounded. Encrypted TLS tunnels and Firebase Cloud Messaging provide resilient command‑and‑control, allowing operators to throttle mining based on battery level, temperature, and user activity, thereby minimizing detection risk.

The convergence of financial fraud and crypto‑mining on mobile devices amplifies the potential impact on both individuals and enterprises. Beyond direct monetary loss, the unauthorized mining drains battery life, degrades performance, and can expose sensitive data through keylogging and screen capture. Organizations should enforce strict app‑installation policies, leverage Google Play Protect, and deploy mobile threat defense solutions that can detect anomalous background audio playback and suspicious network traffic. End‑users must remain vigilant about side‑loading apps, scrutinize permission requests, and keep devices updated to mitigate the evolving threat landscape posed by sophisticated Android malware like BeatBanker.

New BeatBanker Android malware poses as Starlink app to hijack devices

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...