Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

I was really impressed with this $400 portable projector

Attackers abuse Velociraptor’s forensic tools for deploying Visual Studio code for C2 tunneling

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play
Identity

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

userBy userJuly 8, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 8, 2025Ravi LakshmananMalware/Mobile Security

Anatsa Android Banking Trojan

Cybersecurity researchers have discovered an Android banking malware campaign that utilizes a Trojan horse named Anatsa, which targets North American users, using a malicious app published on Google’s official app marketplace.

The malware, which pretends to be a “PDF update” to the document viewer app, provides a deceptive overlay when users try to access the banking application, claiming that the service was temporarily suspended as part of scheduled maintenance.

“This marks at least the third instance where Anatsa focuses its business on mobile banking customers in the US and Canada,” Dutch mobile security company Threatfabric said in a report shared with Hacker News. “Like the previous campaign, Anatsa is distributed through the official Google Play Store.”

Also known as Teabot and Toddlers, Anatsa is known to have been active since at least 2020 and is usually delivered to victims via the Dropper app.

Cybersecurity

Earlier last year, it was discovered that Anatsa was targeting Android device users from Slovakia, Slovenia and Czechia. This first uploaded a benign app that decorated the PDF reader and phone cleaner in the play store and introduced malicious code a week after its release.

Like other Android Banking Trojans, Anatsa can provide operators with the ability to steal credentials through overlays and keylog attacks, carry out device transaction fraud (DTO) and launch fraudulent transactions from the victim’s device.

ThreatFabric said the Anatsa campaign follows a predictable but well-oiled process, including establishing a developer profile in the App Store and publishing legitimate apps that work according to the ads.

“When an application gains a significant user base, updates are deployed and embed malicious code into the app, often with thousands or tens of thousands of downloads,” the company said. “This built-in code downloads and installs Anatsa as a separate application on your device.”

Malware receives a dynamic list of targeted financial and banking institutions from external servers, allowing attackers to perform account acquisitions, key logs, or fully automated transaction entitlement theft.

An important factor that allows Anatsa to avoid detection and maintain a high success rate is the cyclical nature of attacks scattered across periods of NO activity.

The newly discovered app targeting North American audiences is equipped with a document viewer (apk package name: “com.stellarastra.astracontrol_managerreadercleaner”) and is published by a developer named “Hybrid Car Simulator, Drift & Racing.” Both the app and associated developer accounts are no longer accessible in the Playback Store.

According to Sensor Tower statistics, the app was first published on May 7, 2025 and reached the fourth spot in the “Top Free -Tools” category on June 29, 2025. It is estimated that it has been downloaded about 90,000 times.

“The dropper followed Anatsa’s established Modus Operandi. It was originally launched as a legal app, but it was converted to malicious about six weeks after its release,” says Threatfabric. “The campaign’s distribution window was short but influential and ran from June 24th to 30th.”

Cybersecurity

The Anatsa variant is configured to target a broader set of banking apps in the US, reflecting the malware’s focus on leveraging regional financial entities, according to the company.

Another clever feature built into malware is the ability to display fake maintenance notifications when trying to access a target banking application. This tactic not only hides malicious activities that occur within the app, but also prevents customers from contacting the bank’s support team, thereby delaying detection of financial fraud.

“The latest business relied on established tactics targeting local financial institutions as well as expanding its reach,” Threatfabric said. “Organisations in the financial sector are encouraged to review the intelligence provided and assess potential risks or impacts on customers and systems.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe latest update for Mastodon prepares quote posts, Revamps Design app
Next Article Chimpap pushes grass into the ears and develops fashion trends on the butt
user
  • Website

Related Posts

Attackers abuse Velociraptor’s forensic tools for deploying Visual Studio code for C2 tunneling

August 30, 2025

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

I was really impressed with this $400 portable projector

Attackers abuse Velociraptor’s forensic tools for deploying Visual Studio code for C2 tunneling

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.