Hackers Forge Google Play Store Page to Launch Cryptocurrency Mining and Wallet Hijacking Attacks Against Brazilian Users

Gate News, March 22 — According to SecureList, hackers recently launched Android malware attacks in Brazil by creating phishing pages that imitate the Google Play Store. All known victims are located in Brazil.

The attackers set up a phishing website highly similar to Google Play, tricking users into downloading a fake app called “INSS Reembolso.” Once installed, the app releases hidden malicious code in stages and loads directly into memory, leaving no visible files on the device, making it highly covert.

One of the core functions of the malware is cryptocurrency mining. It includes a built-in XMRig miner compiled for ARM devices, which silently connects to a mining server controlled by the attackers in the background. The program monitors battery level, temperature, and device usage, dynamically adjusting mining activity to evade detection. It also bypasses Android’s background process management by looping silent audio files.

Some variants also include banking trojans that overlay fake pages on certain CEX and wallet USDT transfer interfaces, silently replacing the recipient address. Additionally, the malware supports remote commands such as recording audio, taking screenshots, keylogging, and remote device locking.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments