Article Details
Scrape Timestamp (UTC): 2025-07-08 15:04:22.723
Original Article Text
Click to Toggle View
Android malware Anatsa infiltrates Google Play to target US banks. The Anatsa banking trojan has sneaked into Google Play once more via an app posing as a PDF viewer that counted more than 50,000 downloads. The malware becomes active on the device immediately after installing the app, tracking users launching North American banking apps and serving them an overlay that allows accessing the account, keylogging, or automating transactions. According to Threat Fabric researchers who spotted the latest campaign and reported it to Google, Anatsa shows users a fake message when they open the targeted apps, informing of a scheduled banking system maintenance. The notification is displayed on top of the banking app’s UI, obscuring the malware’s activity in the background and preventing victims from contacting their bank or checking their accounts for unauthorized transactions. Threat Fabric has been tracking Anatsa on Google Play for years, uncovering multiple infiltrations under fake or trojanized utility and productivity tools. A campaign uncovered in November 2021 achieved 300,000 downloads, another exposed in June 2023 had 30,000 downloads, and another one disclosed in February 2024 reached 150,000 downloads. In May 2024, mobile security firm Zscaler reported that Anatsa had achieved yet another infiltration on Android’s official app store, with two apps posing as a PDF reader and a QR reader, collectively amassing 70,000 downloads. The Anatsa app that Threat Fabric discovered on Google Play this time is ‘Document Viewer – File Reader,’ published by ‘Hybrid Cars Simulator, Drift & Racing.’ The researchers report that this app follows a sneaky tactic Anatsa operators demonstrated in previous cases too, where they keep the app “clean” until it gains a substantial userbase. Once the app becomes sufficiently popular, they introduce malicious code via an update that fetches an Anatsa payload from a remote server and installs it as a separate application. Then, Anatsa connects to the command-and-control (C2) and receives a list of targeted apps to monitor for on the infected device. The latest Anatsa app delivered the trojan between June 24 and 30, six weeks after its initial release on the store. Google has since removed the malicious app from the store. If you installed the app, it is recommended that you uninstall it immediately, run a full system scan using Play Protect, and reset your banking account credentials. Anatsa periodically finds ways to infiltrate Google Play, so users should only trust apps from reputable publishers, check user reviews, pay attention to the requested permissions, and keep the number of installed apps on your device at the necessary minimum. 8 Common Threats in 2025 While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques. Drawing from Wiz's detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.
Daily Brief Summary
Anatsa, a banking trojan, was again found disguised as a legitimate app on Google Play, this time mimicking a PDF viewer with over 50,000 downloads.
The malware activates upon the app's installation, targeting users of North American banking apps by overlaying fake notifications about banking maintenance to conceal its activities.
Threat Fabric researchers have monitored Anatsa's presence on Google Play for years, noting repeated incidents where the trojan achieved significant download milestones through trojanized utility and productivity apps.
In a recent modus operandi, the operators keep the initial versions of these apps clean and later push an update that introduces malicious code to download and install the Anatsa payload.
Upon infection, Anatsa connects to its command-and-control server to receive instructions and list of apps to monitor, enabling unauthorized access and fraudulent transactions.
The most recent affected app, 'Document Viewer – File Reader' by 'Hybrid Cars Simulator, Drift & Racing,' delivered its trojan payload between June 24 and 30, following an update six weeks post-release.
Google has since removed the malicious app, and affected users are advised to uninstall the app, run a full system scan, and reset their banking credentials.
Users are advised to download apps only from trusted publishers, scrutinize user reviews, check app permissions, and limit the number of installed apps to enhance security.