Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Langchain is about to become a unicorn, sources say

Glock is anti-Semitism again, and the sky is blue

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play
Identity

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

userBy userJuly 8, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 8, 2025Ravi LakshmananMalware/Mobile Security

Anatsa Android Banking Trojan

Cybersecurity researchers have discovered an Android banking malware campaign that utilizes a Trojan horse named Anatsa, which targets North American users, using a malicious app published on Google’s official app marketplace.

The malware, which pretends to be a “PDF update” to the document viewer app, provides a deceptive overlay when users try to access the banking application, claiming that the service was temporarily suspended as part of scheduled maintenance.

“This marks at least the third instance where Anatsa focuses its business on mobile banking customers in the US and Canada,” Dutch mobile security company Threatfabric said in a report shared with Hacker News. “Like the previous campaign, Anatsa is distributed through the official Google Play Store.”

Also known as Teabot and Toddlers, Anatsa is known to have been active since at least 2020 and is usually delivered to victims via the Dropper app.

Cybersecurity

Earlier last year, it was discovered that Anatsa was targeting Android device users from Slovakia, Slovenia and Czechia. This first uploaded a benign app that decorated the PDF reader and phone cleaner in the play store and introduced malicious code a week after its release.

Like other Android Banking Trojans, Anatsa can provide operators with the ability to steal credentials through overlays and keylog attacks, carry out device transaction fraud (DTO) and launch fraudulent transactions from the victim’s device.

ThreatFabric said the Anatsa campaign follows a predictable but well-oiled process, including establishing a developer profile in the App Store and publishing legitimate apps that work according to the ads.

“When an application gains a significant user base, updates are deployed and embed malicious code into the app, often with thousands or tens of thousands of downloads,” the company said. “This built-in code downloads and installs Anatsa as a separate application on your device.”

Malware receives a dynamic list of targeted financial and banking institutions from external servers, allowing attackers to perform account acquisitions, key logs, or fully automated transaction entitlement theft.

An important factor that allows Anatsa to avoid detection and maintain a high success rate is the cyclical nature of attacks scattered across periods of NO activity.

The newly discovered app targeting North American audiences is equipped with a document viewer (apk package name: “com.stellarastra.astracontrol_managerreadercleaner”) and is published by a developer named “Hybrid Car Simulator, Drift & Racing.” Both the app and associated developer accounts are no longer accessible in the Playback Store.

According to Sensor Tower statistics, the app was first published on May 7, 2025 and reached the fourth spot in the “Top Free -Tools” category on June 29, 2025. It is estimated that it has been downloaded about 90,000 times.

“The dropper followed Anatsa’s established Modus Operandi. It was originally launched as a legal app, but it was converted to malicious about six weeks after its release,” says Threatfabric. “The campaign’s distribution window was short but influential and ran from June 24th to 30th.”

Cybersecurity

The Anatsa variant is configured to target a broader set of banking apps in the US, reflecting the malware’s focus on leveraging regional financial entities, according to the company.

Another clever feature built into malware is the ability to display fake maintenance notifications when trying to access a target banking application. This tactic not only hides malicious activities that occur within the app, but also prevents customers from contacting the bank’s support team, thereby delaying detection of financial fraud.

“The latest business relied on established tactics targeting local financial institutions as well as expanding its reach,” Threatfabric said. “Organisations in the financial sector are encouraged to review the intelligence provided and assess potential risks or impacts on customers and systems.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe latest update for Mastodon prepares quote posts, Revamps Design app
Next Article Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware
user
  • Website

Related Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

July 8, 2025

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

July 8, 2025

Five ways identity-based attacks are violating retail

July 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Langchain is about to become a unicorn, sources say

Glock is anti-Semitism again, and the sky is blue

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.