New Mirax Android RAT Turns Infected Phones into Residential Proxy Nodes
A recently discovered variant of the Mirax malware, a type of Android Remote Access Trojan (RAT), has been found to transform infected devices into residential proxy nodes. This development poses significant risks to both individual users and organizations that rely on compromised devices for malicious activities.
Key Features of the New Mirax Variant:
- Accessibility Services Abuse: The malware requests Accessibility Service permissions, which grant it extensive control over the device without requiring user interaction.
- Proxy Node Functionality: Once installed, the RAT turns the infected phone into a proxy node, allowing attackers to route traffic through these devices for various malicious purposes such as launching DDoS attacks or conducting phishing campaigns.
How It Works:
- Infection Vector: The malware typically spreads via unofficial app stores and social media platforms.
- Permissions Request: Upon installation, it requests Accessibility Services permissions. If granted, the malware can monitor user activities, control device functions, and establish a persistent backdoor.
- Proxy Node Setup: Once established, the compromised device is used as part of a larger network of proxy nodes to mask the origin of malicious traffic.
Potential Risks:
- **Data
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



