220,000+
A new and sophisticated Android Remote Access Trojan (RAT) named Mirax is being actively distributed through malicious ads on Meta's popular platforms, including Facebook, Instagram, and Messenger. According to research from Outpost24's KrakenLabs, the campaign has already infected over 220,000 users, with a primary focus on Spanish-speaking countries. The malware provides attackers with full remote control over the victim's device. A key feature of Mirax is its ability to turn the infected Android phone into a residential SOCKS5 proxy, which is then used to route and anonymize other malicious activities. The operation is professionally run, with the threat actor, known as Mirax Bot, selling the malware as an exclusive Malware-as-a-Service (MaaS) on underground forums.
The Mirax campaign demonstrates a multi-stage attack chain that leverages trusted platforms for initial distribution.
The impact on the 220,000+ victims is severe. Their devices are fully compromised, leading to the theft of personal data, banking credentials, and private conversations. Furthermore, their devices are being used as part of a criminal infrastructure, which could potentially implicate the device owner in malicious activities conducted through the proxy.
The operation is notable for its business model. Mirax is not a widespread, low-quality malware; it's marketed as a private, high-end MaaS. Subscription prices start at $2,500 for three months, with a preference for Russian-speaking actors with established reputations. This indicates a sophisticated threat actor focused on providing a reliable, high-quality tool for other criminals, rather than just conducting the attacks themselves.
Disabling the 'Install from unknown sources' feature on Android devices is the most effective mitigation against this threat.
Educating users about the dangers of sideloading applications and clicking on suspicious ads is a critical preventative measure.
Using a reputable mobile security application can help detect and block the installation of malicious APKs.
The most critical defense against the Mirax RAT is to harden the configuration of the Android OS itself. Specifically, users must ensure that the 'Install from unknown sources' setting is disabled. This single setting prevents the installation of any application (APK file) that does not come from the official Google Play Store. The entire Mirax attack chain relies on tricking the user into enabling this feature. By proactively disabling it, users can effectively shut down this primary infection vector. For enterprise environments with managed mobile devices (MDM), this setting should be enforced via policy so that end-users cannot change it.
For users who have already been infected or are at high risk, mobile security software that incorporates executable denylisting can provide protection. Reputable mobile antivirus and security applications maintain blocklists of known malicious APKs and their signatures. When a user attempts to download or install a file matching a known malicious signature, the security software will block the action and alert the user. While this is a reactive measure, it is an important layer of defense for catching known threats like Mirax, especially for users who may be more susceptible to the social engineering tactics used in the malicious Meta ads.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats