New Mirax Android RAT Turns Infected Phones Into Residential Proxy Nodes

By Published On: April 15, 2026

Mobile security threats are constantly evolving, and a new Android malware named Mirax highlights this alarming trend. This sophisticated threat, first spotted in underground criminal forums, represents a significant escalation beyond typical banking Trojans. It not only targets sensitive financial information but also weaponizes victim devices, turning them into components of a malicious infrastructure. Understanding Mirax is crucial for anyone involved in mobile security, incident response, or IT infrastructure management.

Mirax: A Dual-Threat Android RAT

Mirax is an Android Remote Access Trojan (RAT) that emerged in late 2025, quickly gaining notoriety for its dual-pronged attack strategy. Unlike many predecessors that focus solely on data theft, Mirax combines traditional credential harvesting with a more insidious function: transforming infected smartphones into residential proxy nodes.

  • Credential Theft: Mirax is designed to steal banking credentials, personal identifiable information (PII), and other sensitive data, posing a direct financial risk to users.
  • Residential Proxy Network: The malware commandeers infected devices, routing illicit traffic through them. This allows threat actors to mask their origins, bypass geographic restrictions, and conduct further malicious activities, such as credential stuffing or large-scale spam campaigns, appearing as legitimate residential internet users.

This dual functionality makes Mirax particularly dangerous, as it not only compromises individual users but also contributes to a larger, more resilient network for further cybercrime.

Geographic Scope and Impact

While initially observed circulating within European underground forums, Mirax’s design and capabilities suggest a potential for broader global reach. The nature of Android malware allows for rapid dissemination, and the utility of residential proxies is universal for cybercriminals. The impact extends beyond direct financial loss for victims; the use of compromised devices as proxy nodes can implicate legitimate users in illicit activities, leading to potential legal complications or service disruptions.

Technical Overview of Mirax Operations

Mirax employs a range of techniques typical of advanced Android malware to establish persistence and evade detection. Upon successful infection, which often occurs through phishing attacks or malicious app downloads, Mirax works to:

  • Gain Elevated Privileges: It seeks to acquire extensive permissions on the device, often tricking users into granting accessibility services, which then allows it to intercept and manipulate app interactions.
  • Overlay Attacks: Similar to many banking Trojans, Mirax can display fake login screens over legitimate banking applications to trick users into entering their credentials directly into the malware.
  • Network Evasion: By leveraging the residential proxy functionality, Mirax traffic blends in with legitimate user traffic, making it harder for network security solutions to detect anomalous activity originating from the compromised device itself.

Remediation Actions for Mirax Infection

Mitigating the threat of Mirax requires a multi-layered approach, combining user awareness with robust technical controls. For individuals and organizations, immediate actions following a suspected infection are critical.

  • Isolate Infected Devices: Disconnect the device from all networks (Wi-Fi and mobile data) to prevent further data exfiltration or use as a proxy node.
  • Factory Reset: A full factory reset is often the most reliable method to remove tenacious Android malware like Mirax. Ensure all important data is backed up to a secure, uninfected location first.
  • Change Credentials: Immediately change passwords for all critical accounts (banking, email, social media) accessed from the device, especially those susceptible to overlay attacks. Use strong, unique passwords and enable multi-factor authentication (MFA) wherever possible.
  • Review Account Activity: Monitor banking statements and other financial accounts for any suspicious transactions.
  • Report Incident: Report the infection to relevant authorities or your organization’s security team.

Preventive Measures

Proactive prevention is the best defense against threats like Mirax:

  • Download Apps from Reputable Sources: Only download applications from trusted app stores like Google Play. Avoid third-party app stores or direct APK downloads from unknown origins.
  • Scrutinize App Permissions: Carefully review the permissions requested by apps before installation. Be wary of apps asking for excessive or irrelevant permissions.
  • Maintain Software Updates: Keep your Android operating system and all applications updated to patch known vulnerabilities.
  • Use Mobile Security Software: Install and regularly update a reputable mobile antivirus or security solution. These tools can often detect and block known malware families.
  • Enable Multi-Factor Authentication (MFA): MFA adds an extra layer of security, making it harder for attackers to gain access even if they steal your credentials.
  • Exercise Caution with Links and Attachments: Be skeptical of unsolicited messages containing links or attachments, which are common vectors for malware delivery.

Tools for Detection and Mitigation

Effective defense against Android RATs like Mirax often involves a combination of scanning tools and robust security practices. While there isn’t a specific CVE for Mirax at this time due to its recent discovery and evolving nature, general mobile security tools are crucial.

Tool Name Purpose Link
VirTotal File and URL analysis for malware detection https://www.virustotal.com/
Android Debug Bridge (ADB) Device management and forensic analysis for advanced users https://developer.android.com/studio/command-line/adb
Mobile Threat Defense (MTD) Solutions Real-time protection, threat detection, and risk assessment for mobile devices (e.g., Zimperium, Lookout) (Provider-specific links)
Reputable Mobile Antivirus Apps On-device malware scanning and real-time protection (e.g., Bitdefender Mobile Security, ESET Mobile Security) (Provider-specific links)

Conclusion

The emergence of Mirax underscores the increasing sophistication of mobile malware. Its ability to simultaneously steal credentials and weaponize devices into residential proxy nodes poses a significant threat to individual users and the broader cybersecurity landscape. Staying informed, practicing rigorous cyber hygiene, and deploying appropriate security tools are essential defenses against this new generation of mobile threats. Organizations and individuals must remain vigilant to protect their data and devices from evolving attacks like Mirax.

Share this article

Leave A Comment