Security researchers have identified Mirax, a sophisticated Remote Access Trojan (RAT) that is redefining mobile malware by transforming infected smartphones into residential proxy nodes, enabling cybercriminals to hide in plain sight while launching large-scale attacks.
A newly uncovered Android threat is raising alarms across the cybersecurity community, not just for what it steals, but for what it becomes.
Insights from a recent investigation published by Cleafy Labs reveal that Mirax is already being actively deployed in targeted campaigns, marking a significant evolution in mobile threat capabilities.
A New Generation of Android Malware
Mirax is not just another banking trojan—it represents a hybrid cybercrime tool combining:
- Full remote control of infected devices
- Advanced credential theft mechanisms
- Built-in residential proxy infrastructure
Unlike traditional Android malware, Mirax operates under a Malware-as-a-Service (MaaS) model, distributed selectively among trusted cybercriminal affiliates. This controlled distribution increases its effectiveness while reducing exposure to security researchers.
Initially observed targeting Spanish-speaking users, the malware has already reached over 200,000 individuals via social media advertising campaigns, signaling its potential for rapid global expansion.
How Mirax Infects Devices
The infection chain is both clever and effective, leveraging social engineering and trusted platforms:
- Victims are lured through malicious ads on platforms like Facebook and Instagram
- Ads promote fake applications such as illegal sports streaming apps
- Users are redirected to phishing sites and encouraged to download APK files
- The malware is delivered via a multi-stage dropper hosted on GitHub
Once installed, the app disguises itself as a legitimate video player and requests elevated permissions, including Accessibility Services, giving attackers deep control over the device.
Advanced Capabilities: Beyond Traditional RATs
Mirax introduces a powerful set of features that go far beyond typical mobile malware:
Full Device Control
Attackers can:
- Execute commands remotely
- Navigate the device interface
- Capture screens and monitor activity in real time
Dynamic Overlay Attacks
The malware injects fake login screens (HTML overlays) over legitimate apps, stealing credentials without the user noticing.
Keylogging & Surveillance
Mirax continuously records:
- Keystrokes across applications
- Lock screen configurations (PIN, pattern, biometrics)
Data Exfiltration
Sensitive data – including SMS messages, app data, and even camera feeds – can be extracted via encrypted channels.
The Game-Changer: Residential Proxy Abuse
What truly sets Mirax apart is its ability to convert infected devices into residential proxy nodes.
Using SOCKS5 protocol and multiplexing techniques, attackers can:
- Route malicious traffic through real user IP addresses
- Bypass geolocation restrictions
- Evade fraud detection systems
- Launch attacks that appear legitimate
This means a compromised smartphone is no longer just a victim it becomes part of a global cybercrime infrastructure.
Why This Matters Globally
The implications are serious for both individuals and organizations:
- Financial institutions face increased fraud risk due to trusted IP masking
- Enterprises may struggle to detect malicious traffic coming from legitimate sources
- Users unknowingly contribute to cybercrime operations
- Security teams must now defend against attacks originating from “trusted” residential networks
This evolution reflects a broader trend: cybercriminals are monetizing every layer of compromise, from data theft to infrastructure abuse.
MEA Perspective (Contextual Relevance)
While current campaigns are focused on Europe, the techniques used by Mirax are highly transferable.
Regions across the Middle East and Africa – where mobile adoption is high and APK sideloading is common – could become prime targets for future campaigns.
For governments, telecom operators, and financial institutions in the region, this highlights the urgent need to strengthen mobile security strategies and user awareness programs.
10 Essential Security Actions
To defend against threats like Mirax, organizations should take the following steps:
- Restrict APK sideloading on corporate and managed devices
- Monitor mobile traffic anomalies, especially unusual proxy behavior
- Implement mobile threat defense (MTD) solutions
- Enforce strict app permission controls, especially Accessibility Services
- Educate users on social media phishing and malicious ads
- Deploy behavioral analytics to detect abnormal device activity
- Secure API and authentication systems against proxy-based attacks
- Regularly audit installed applications on enterprise devices
- Strengthen fraud detection systems to identify residential proxy abuse
- Partner with trusted cybersecurity providers like Saintynet Cybersecurity and invest in continuous training and awareness programs via saintynet.com
Industry Insight: A Shift in Cybercrime Economics
Mirax highlights a critical shift in attacker strategy:
Infected devices are no longer just targets they are assets.
By combining RAT capabilities with proxy infrastructure, attackers maximize the value of each compromised device, enabling:
- Long-term persistence
- Multi-purpose exploitation
- Scalable attack operations
This trend is expected to grow, particularly with the rise of IoT devices and low-cost Android ecosystems.
For more insights into evolving mobile threats and cybercrime trends, explore related analysis on CyberCory.com.
Conclusion
Mirax is more than just another Android malware strain—it represents a new phase in mobile cyber threats, where compromised devices are weaponized into stealth infrastructure for global attacks.
With its combination of remote control, credential theft, and residential proxy capabilities, it poses a serious challenge to traditional detection and defense mechanisms.
As highlighted through research from Cleafy Labs, organizations must act now to strengthen mobile security, improve user awareness, and adapt to a threat landscape where trust itself is being exploited.
CyberCory will continue to monitor this evolving threat and provide updates as new campaigns and tactics emerge.




