{"id":25338,"date":"2026-03-11T15:45:04","date_gmt":"2026-03-11T11:45:04","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=25338"},"modified":"2026-03-11T15:45:04","modified_gmt":"2026-03-11T11:45:04","slug":"beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/25338\/","title":{"rendered":"Android trojan posing as government services and Starlink apps"},"content":{"rendered":"<p>To achieve their malign aims, Android malware developers have to address several challenges in a row: trick users to get inside their smartphones, dodge security software, talk victims into granting various system permissions, keep away from built-in battery optimizers that kill resource hogs, and, after all that, make sure their malware actually turns a profit. The creators of the BeatBanker \u2014 an Android\u2011based malware campaign recently discovered by our experts \u2014 have come up with something new for each one of these steps. The attack is (for now) aimed at Brazilian users, but the developers\u2019 ambitions will almost certainly push them toward international expansion, so it\u2019s worth staying on guard and studying the threat actor\u2019s tricks. You can find a full technical analysis of the malware on <a href=\"https:\/\/securelist.com\/beatbanker-miner-and-banker\/119121\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a>.<\/p>\n<h2>How BeatBanker infiltrates a smartphone<\/h2>\n<p>The malware is distributed through specially crafted phishing pages that mimic the Google Play Store. A page that\u2019s easily mistaken for the official app marketplace invites users to download a seemingly useful app. In one campaign, the trojan disguised itself as the Brazilian government services app, INSS Reembolso; in another, it posed as the Starlink app.<\/p>\n<div id=\"attachment_55406\" style=\"width: 1392px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/11152719\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55406\" class=\"wp-image-55406 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/11152719\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png\" alt=\"The malicious site cupomgratisfood{.}shop does an excellent job imitating an app store. It's just unclear why the fake INSS Reembolso appears all of three times. To be extra sure, perhaps?!\" width=\"1382\" height=\"511\"><\/a><p id=\"caption-attachment-55406\" class=\"wp-caption-text\">The malicious site cupomgratisfood{.}shop does an excellent job imitating an app store. It\u2019s just unclear why the fake INSS Reembolso appears all of three times. To be extra sure, perhaps?!<\/p><\/div>\n<p>The installation takes place in several stages to avoid requesting too many permissions at once and to further lull the victim\u2019s vigilance. After the first app is downloaded and launched, it displays an interface that also resembles Google Play and simulates an update for the decoy app \u2014 requesting the user\u2019s permission to install apps, which doesn\u2019t look out-of-the-ordinary in context. If you grant this permission, the malware downloads additional malicious modules to your smartphone.<\/p>\n<div id=\"attachment_55407\" style=\"width: 512px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/11152722\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55407\" class=\"wp-image-55407 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/11152722\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png\" alt=\"After installation, the trojan simulates a decoy app update via Google Play by requesting permission to install applications while downloading additional malicious modules in the process\" width=\"502\" height=\"830\"><\/a><p id=\"caption-attachment-55407\" class=\"wp-caption-text\">After installation, the trojan simulates a decoy app update via Google Play by requesting permission to install applications while downloading additional malicious modules in the process<\/p><\/div>\n<p>All components of the trojan are encrypted. Before decrypting and proceeding to the next stages of infection, it checks to ensure it\u2019s on a real smartphone and in the target country. BeatBanker immediately terminates its own process if it finds any discrepancies or detects that it\u2019s running in emulated or analysis environments. This complicates dynamic analysis of the malware. Incidentally, the fake update downloader injects modules directly into RAM to avoid creating files on the smartphone that would be visible to security software.<\/p>\n<p>All these tricks are nothing new and frequently used in complex malware for desktop computers. However, for smartphones, such sophistication is still a rarity, and not every security tool will spot it. Users of <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky products<\/a>\u00a0are protected from this threat.<\/p>\n<h2>Playing audio as a shield<\/h2>\n<p>Once established on the smartphone, BeatBanker downloads a module for mining Monero cryptocurrency. The authors were very concerned that the smartphone\u2019s aggressive battery optimization systems might shut down the miner, so they came up with a trick: playing an all-but-inaudible sound at all times. Power consumption control systems typically spare apps that are playing audio or video to avoid cutting off background music or podcast players. In this way, the malware can run continuously. Additionally, it displays a persistent notification in the status bar, asking the user to keep the phone on for a system update.<\/p>\n<div id=\"attachment_55408\" style=\"width: 447px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/11152724\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-03.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55408\" class=\"wp-image-55408 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/11152724\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-03.png\" alt=\"Example of a persistent system update notification from another malicious app masquerading as the Starlink app\" width=\"437\" height=\"111\"><\/a><p id=\"caption-attachment-55408\" class=\"wp-caption-text\">Example of a persistent system update notification from another malicious app masquerading as the Starlink app<\/p><\/div>\n<h2>Control via Google<\/h2>\n<p>To manage the trojan, the authors leverage Google\u2019s legitimate Firebase Cloud Messaging (FCM) \u2014 a system for receiving notifications and sending data from a smartphone. This feature is available to all apps and it\u2019s the most popular method for sending and receiving data. Thanks to FCM, attackers can monitor the device\u2019s status and change its settings as needed.<\/p>\n<p>Nothing bad happens for a while after the malware is installed: the attackers wait it out. Then they trigger the miner, but they\u2019re careful to throttle it back if the phone overheats, the battery starts dipping, or the owner happens to be using the device. All of this is handled via FCM.<\/p>\n<h2>Theft and espionage<\/h2>\n<p>In addition to the crypto miner, BeatBanker installs extra modules to spy on the user and rob them at the right moment. The spyware module requests Accessibility Services permission, and if this is granted, begins monitoring everything that\u2019s happening on the smartphone.<\/p>\n<p>If the owner opens the Binance or Trust Wallet app to send USDT, the malware overlays a fake screen on top of the wallet interface, effectively swapping the recipient\u2019s address for its own. All transfers go to the attackers.<\/p>\n<p>The trojan features an advanced remote control system and is capable of executing many other commands:<\/p>\n<ul>\n<li>Intercepting one-time codes from Google Authenticator<\/li>\n<li>Recording audio from the microphone<\/li>\n<li>Streaming the screen in real-time<\/li>\n<li>Monitoring the clipboard and intercept keystrokes<\/li>\n<li>Sending SMS messages<\/li>\n<li>Simulating taps on specific areas of the screen and text input according to a script sent by the attacker, and much more<\/li>\n<\/ul>\n<p>All of this makes it possible to rob the victim when they use any other banking or payment services \u2014 not just crypto payments.<\/p>\n<p>Sometimes victims are infected with a different module for espionage and remote smartphone control \u2014 the BTMOB remote access trojan. Its malicious capabilities are even broader, including:<\/p>\n<ul>\n<li>Automatic acquisition of certain permissions on Android 13\u201315<\/li>\n<li>Continuous geolocation tracking<\/li>\n<li>Access to the front and rear cameras<\/li>\n<li>Obtaining PIN codes and passwords for screen unlocking<\/li>\n<li>Capturing keyboard input<\/li>\n<\/ul>\n<h2>How to protect yourself from BeatBanker<\/h2>\n<p>Cybercriminals are constantly refining their attacks and coming up with new ways to profit from their victims. Despite this, you can protect yourself by following a few simple precautions:<\/p>\n<ul>\n<li><strong>Download apps from official sources only<\/strong>, such as Google Play or the app store preinstalled by the vendor. If you find an app while searching the internet, don\u2019t open it via a link from your browser; instead, head to the Google Play app or another branded store on your smartphone to search for it there. While you\u2019re at it, check the number of downloads, the app\u2019s age, and look at the ratings and reviews. Avoid new apps, apps with low ratings, and those with a small number of downloads.<\/li>\n<li><strong>Check any permissions you grant<\/strong>. Don\u2019t grant permissions if you\u2019re not sure what they do or why that specific app requires them. Be extra careful with permissions like <em>Install unknown apps<\/em>, A<em>ccessibility<\/em>, <em>Superuser<\/em>, and <em>Display over other apps<\/em>. We\u2019ve written about these in detail in a <a href=\"https:\/\/www.kaspersky.com\/blog\/android-most-dangerous-features\/49418\/\" target=\"_blank\" rel=\"noopener nofollow\">separate article<\/a>.<\/li>\n<li><strong>Equip your device with a comprehensive anti-malware solution<\/strong>. We, naturally, recommend <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>. Users of Kaspersky products are protected from BeatBanker \u2014 detected with the verdicts <em>HEUR:Trojan-Dropper.AndroidOS.BeatBanker<\/em> and <em>HEUR:Trojan-Dropper.AndroidOS.Banker.*<\/em>.<\/li>\n<li><strong>Regularly update both your operating system and security software<\/strong>. For <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>, which is currently unavailable on Google Play, please review our <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-install-kaspersky-apps-from-alternative-stores\/52889\/\" target=\"_blank\" rel=\"noopener nofollow\">detailed instructions on installing and updating the app<\/a>.<\/li>\n<\/ul>\n<blockquote><p>Threats to Android users have been going through the roof lately. Check out our other posts on the most relevant and widespread Android attacks and tips for keeping you and your loved ones safe:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/growing-2026-android-threats-and-protection\/55191\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>The perfect storm of Android threats<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/mental-health-apps-issues-2026\/55395\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Brain drain: vulnerabilities in mental health apps<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/pixnapping-cve-2025-48561\/54756\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Pixnapping vulnerability: unblockable screenshots of your Android phone<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/nfc-gate-relay-attacks-2026\/55116\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>NFC skimming attacks<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/notification-listener-in-kaspersky-for-android\/54466\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>A new layer of anti-phishing security in Kaspersky for Android<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone. <\/p>\n","protected":false},"author":312,"featured_media":25343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[105,2629,2641,1505,22,183,1429,695,2151,521,131,692],"class_list":{"0":"post-25338","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-bankers","10":"tag-crypto-wallets","11":"tag-cryptocurrencies","12":"tag-google","13":"tag-google-play","14":"tag-miners","15":"tag-scam","16":"tag-stealers","17":"tag-threats","18":"tag-tips","19":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/25338\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30260\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/13259\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30132\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/29038\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/31921\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30532\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/41429\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/14371\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/55401\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/23716\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/24810\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/33292\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30387\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/36016\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/35674\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/312"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25338"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25338\/revisions"}],"predecessor-version":[{"id":25344,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25338\/revisions\/25344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25343"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}