1. Home
  2. / Science and Technology
  3. / An apparently common application can hide the PixRevolution virus on an Android phone, which remains invisible until it identifies a financial transaction and, at that moment, takes control of the Pix transfer to modify the data and divert funds.
Reading time 3 min of reading Comments 0 comments

An apparently common application can hide the PixRevolution virus on an Android phone, which remains invisible until it identifies a financial transaction and, at that moment, takes control of the Pix transfer to modify the data and divert funds.

Written by Caio Aviz
Published on 28/04/2026 at 10:19
Be the first to react!
React to this article

New financial malware acts during operations and expands digital security alert among Pix users in the country

Initially, a new type of banking virus targeting Android phones has begun to worry digital security specialists in Brazil.

Currently, the malware, identified as PixRevolution, focuses on users of the Pix system, created by the Central Bank of Brazil.

Furthermore, the attack occurs silently and, at the same time, during the transaction itself.

Thus, values can be diverted in seconds, while the user is still making the transfer, which increases the risk.

Consequently, the scenario is already considered critical.

Between July 2024 and June 2025, approximately 24 million Brazilians suffered financial scams involving Pix or payment slips.

In this context, the loss reached approximately R$ 29 billion, according to data from the Brazilian Public Security Forum.

At the same time, projections indicate that, by 2028, Pix frauds could exceed R$ 12 billion, which reinforces the scale of the problem.

Technical investigation reveals direct action on the device

Firstly, specialists point out that PixRevolution integrates a new generation of financial trojans.

In this sense, the malware acts directly on the victim’s device.

Furthermore, it uses Android accessibility permissions.

Thus, the system begins to monitor everything that appears on the screen, including passwords, codes, and banking data.

Meanwhile, during a transfer, the attack occurs in real-time.

That is, the virus interferes at the moment of operation confirmation.

Consequently, information can be altered and, thus, the value is redirected to criminal accounts, without the user noticing.

Furthermore, the malware also performs automatic actions within banking applications.

For example:

Automatic field filling
Authorization of financial operations
Notification interception

Therefore, device control can be discreetly compromised.

Infection starts with fake apps

Next, specialists highlight that the main form of infection is social engineering.

In this scenario, criminals use fake applications that mimic reliable services.

Thus, the user is induced to install the application without realizing the risk involved.

After that, the virus starts operating silently.

That is, it is activated only when it identifies sensitive activities on the device.

For example, the malware springs into action upon detecting access to financial applications or the initiation of a Pix transaction.

https://clickpetroleoegas.com.br/pai-envia-pix-para-filha-doacao-receita-federal-imposto-de-renda-problema-fiscal-caes/

Warning signs indicate possible compromise

On the other hand, even with the sophistication of the attack, some signs may indicate that the phone has been compromised.

Among them, the following stand out:

Unusual device slowness
Unknown applications installed
Excessive permission requests
Unrecognized financial transactions

Thus, user attention becomes essential to avoid losses.

Basic measures help reduce risks

Given this scenario, specialists recommend simple digital security practices.

Among them:

Download apps only from official stores
Avoid accessing suspicious links
Review permissions granted to apps
Keep the operating system updated
Double-check during Pix transfers

Finally, considering that over 76% of the Brazilian population uses Pix, the growth of this type of attack reinforces the need for constant care in the digital environment, especially given the speed of transactions and the difficulty of reversing values.

Sign up
Notify of
guest
0 Comments
most recent
older Most voted
Built-in feedback
View all comments
Caio Aviz

Escrevo sobre o mercado offshore, petróleo e gás, vagas de emprego, energias renováveis, mineração, economia, inovação e curiosidades, tecnologia, geopolítica, governo, entre outros temas. Buscando sempre atualizações diárias e assuntos relevantes, exponho um conteúdo rico, considerável e significativo. Para sugestões de pauta e feedbacks, faça contato no e-mail: avizzcaio12@gmail.com.

Share in apps
0
I'd love to hear your opinion, please comment.x