# Mirax Android RAT Exploits Meta Advertising to Reach 220,000+ Users, Converting Devices into Proxy Infrastructure
## The Threat
Security researchers have identified a new and actively distributed Android remote access trojan (RAT) called Mirax that is being weaponized at scale against Spanish-speaking regions. The malware has already reached over 220,000 potential victims through advertisements placed on Meta platforms, including Facebook, Instagram, Messenger, and Threads. Mirax represents a concerning evolution in mobile malware campaigns, combining sophisticated RAT capabilities with proxy functionality to create a distributed botnet of compromised Android devices.
Unlike traditional mobile malware that primarily steals data or deploys ransomware, Mirax is designed to convert infected devices into SOCKS5 proxies—allowing threat actors to route traffic through thousands of compromised phones. This capability transforms victim devices into valuable infrastructure for criminal operations, including fraud, credential theft, and lateral movement into corporate networks.
## Campaign Distribution and Targeting
### How Mirax Spreads
The distribution method employed by Mirax's operators is notably sophisticated. Rather than relying on traditional malicious app store submissions or phishing links, the threat actors are purchasing legitimate advertising space on Meta's platforms. This approach provides several tactical advantages:
The campaign has achieved significant reach, with confirmed numbers exceeding 220,000 account engagements across Meta's ecosystem. However, the actual infection rate—the percentage of users who installed the malware—may be considerably lower, as not all ad clicks result in successful payload delivery.
### Geographic and Linguistic Focus
Mirax primarily targets Spanish-speaking populations, with the heaviest concentration of campaigns directed toward:
This geographic focus suggests threat actors have optimized their social engineering and malware for Spanish-language environments, potentially using culturally relevant lures or messaging to increase infection success rates.
## Technical Analysis
### Mirax Capabilities
The malware demonstrates a comprehensive feature set typical of modern Android RATs:
| Capability | Purpose |
|-----------|---------|
| Remote Code Execution | Execute arbitrary commands on the device |
| Screen Recording | Capture user activities and sensitive information |
| SOCKS5 Proxy | Route network traffic through compromised device |
| SMS Interception | Intercept and manipulate text messages |
| Contact and Media Access | Extract phone contacts, photos, and documents |
| Device Control | Control device functions remotely |
| Persistence Mechanisms | Maintain presence across reboots and updates |
### The SOCKS5 Proxy Component
The SOCKS5 proxy functionality is particularly notable, as it transforms each infected device into a valuable asset within a broader criminal infrastructure. SOCKS5 proxies allow threat actors to:
This proxy capability suggests Mirax is being monetized not just for direct theft but also as a service—criminal operators may rent access to the proxy network to other bad actors.
## Implications for Users and Organizations
### Individual Users
Android users in targeted regions face several risks from Mirax infection:
### Organizations
For businesses operating in or serving Spanish-speaking markets, Mirax poses indirect but serious threats:
## Detection and Mitigation
### Technical Indicators
Security teams should monitor for:
### User-Level Protections
Android users should implement these defenses:
### Organizational Response
Companies should:
## Recommendations
### For Individual Users
1. Verify Before Installing: Visit the official app store listing before downloading any application, even if directed through an ad
2. Use Secure Browsers: Enable enhanced security features in mobile browsers
3. Monitor Device Health: Regularly check Settings > Apps to review installed applications and their permissions
4. Report Malicious Ads: Use Meta's reporting tools to flag suspicious advertisements
### For Security Teams
1. Threat Intel Integration: Subscribe to feeds covering Android malware to track Mirax variants
2. Endpoint Detection: Deploy mobile threat detection solutions to identify command-and-control communications
3. Network Analysis: Monitor outbound proxy connections from employee devices
4. Incident Response: Develop procedures for isolating and remediating compromised Android devices
### For Platform Operators
Meta and other advertising platforms should enhance their ad vetting processes to prevent distribution of malware payloads, though the challenge remains significant given the sophisticated nature of these campaigns.
## Conclusion
Mirax represents a maturing Android threat landscape where malware distribution occurs at scale through mainstream advertising networks. By combining sophisticated RAT capabilities with SOCKS5 proxy functionality, the attackers create infrastructure that benefits both direct data theft and broader criminal operations. Organizations and users in Spanish-speaking regions should prioritize Android security hardening, and defenders globally should monitor for similar campaigns that may target other geographic or linguistic populations.