New financial malware acts during operations and expands digital security alert among Pix users in the country
Initially, a new type of banking virus targeting Android phones has begun to worry digital security specialists in Brazil.
Currently, the malware, identified as PixRevolution, focuses on users of the Pix system, created by the Central Bank of Brazil.
Furthermore, the attack occurs silently and, at the same time, during the transaction itself.
-
Chinese engineers develop a bionic robot fish with sensors and artificial intelligence capable of swimming like a real animal and operating autonomously, technology that advances in the race for underwater dominance and could transform monitoring, exploration, and surveillance in the oceans.
-
“ChatGPT Phone”: OpenAI may launch its own AI phone by 2028 and challenge Apple and Samsung — project foresees the end of apps and production of up to 400 million units per year
-
Each SpaceX satellite costs up to R$3 million and requires frequent launches: the company spends billions to keep Starlink active, this being one of the reasons why satellite internet is not yet cheap.
-
“Stretched” exoplanet that looks like an American football intrigues astronomers: WASP-103b is deformed by extreme gravity and is 1,225 light-years away
Thus, values can be diverted in seconds, while the user is still making the transfer, which increases the risk.
Consequently, the scenario is already considered critical.
Between July 2024 and June 2025, approximately 24 million Brazilians suffered financial scams involving Pix or payment slips.
In this context, the loss reached approximately R$ 29 billion, according to data from the Brazilian Public Security Forum.
At the same time, projections indicate that, by 2028, Pix frauds could exceed R$ 12 billion, which reinforces the scale of the problem.
Technical investigation reveals direct action on the device
Firstly, specialists point out that PixRevolution integrates a new generation of financial trojans.
In this sense, the malware acts directly on the victim’s device.
Furthermore, it uses Android accessibility permissions.
Thus, the system begins to monitor everything that appears on the screen, including passwords, codes, and banking data.
Meanwhile, during a transfer, the attack occurs in real-time.
That is, the virus interferes at the moment of operation confirmation.
Consequently, information can be altered and, thus, the value is redirected to criminal accounts, without the user noticing.
Furthermore, the malware also performs automatic actions within banking applications.
For example:
• Automatic field filling
• Authorization of financial operations
• Notification interception
Therefore, device control can be discreetly compromised.
Infection starts with fake apps
Next, specialists highlight that the main form of infection is social engineering.
In this scenario, criminals use fake applications that mimic reliable services.
Thus, the user is induced to install the application without realizing the risk involved.
After that, the virus starts operating silently.
That is, it is activated only when it identifies sensitive activities on the device.
For example, the malware springs into action upon detecting access to financial applications or the initiation of a Pix transaction.
Warning signs indicate possible compromise
On the other hand, even with the sophistication of the attack, some signs may indicate that the phone has been compromised.
Among them, the following stand out:
• Unusual device slowness
• Unknown applications installed
• Excessive permission requests
• Unrecognized financial transactions
Thus, user attention becomes essential to avoid losses.
Basic measures help reduce risks
Given this scenario, specialists recommend simple digital security practices.
Among them:
• Download apps only from official stores
• Avoid accessing suspicious links
• Review permissions granted to apps
• Keep the operating system updated
• Double-check during Pix transfers
Finally, considering that over 76% of the Brazilian population uses Pix, the growth of this type of attack reinforces the need for constant care in the digital environment, especially given the speed of transactions and the difficulty of reversing values.

Be the first to react!