Malicious “Document Reader – File Manager” App on Google Play Delivering Anatsa Banking Trojan

Latest Comments

No comments to show.

Malicious “Document Reader – File Manager” App on Google Play Delivering Anatsa Banking Trojan

A malicious Android app disguised as a harmless document reader and file manager has been caught distributing the Anatsa (TeaBot) banking trojan — despite being available on Google Play with 50,000+ downloads.

Researchers at Zscaler ThreatLabz identified the app, published by “ISTOQMAH,” which tricks users into granting permissions that ultimately enable financial credential theft, phishing overlays, and fraudulent transactions.

🔍 What Anatsa Does

Anatsa is an advanced Android banking malware first seen in 2020. Its capabilities include:

  • 📝 Credential theft
  • ⌨️ Keylogging
  • 💳 Overlay attacks on banking & crypto apps
  • 🤖 Automated transactions (ATS)

Recent variants have targeted over 831 financial institutions across Europe, North America, Germany, South Korea, and cryptocurrency platforms.

🕵️ How the Fake App Works

The malicious app pretends to:

  • Open PDFs
  • Scan documents
  • Manage files

But behind the scenes, it:

  • Downloads the Anatsa payload disguised as an “update”
  • Uses DES-decrypted strings to evade static detection
  • Checks device properties to avoid sandboxes
  • Hides malicious code in malformed ZIP/DEX files
  • Shows a fake file manager if checks fail

Once activated, it aggressively requests Accessibility Services, then silently grants itself sensitive permissions like:

  • SYSTEM_ALERT_WINDOW
  • READ_SMS
  • Overlay and full-screen phishing abilities

This allows it to display fake login screens mimicking legitimate banking apps.

⚠️ Campaign Scale

ThreatLabz reports Anatsa is part of a larger wave of malware droppers that infiltrate Google Play by posing as productivity tools.
Recently, 77 similar apps totaling 19 million installs were removed from the store.

🛡️ Who Is at Risk?

  • Users in Europe, North America, Germany, South Korea
  • Customers of banks & crypto exchanges
  • Anyone downloading “free tools” from Play Store without permission vetting

✔️ Recommendations

For users:

  • Check permissions carefully before installing apps
  • Avoid apps requesting unnecessary accessibility access
  • Reject “updates” pushed outside Google Play
  • Use antivirus or mobile threat defense solutions

For security teams:

  • Review ThreatLabz IOCs
  • Monitor outbound device traffic
  • Conduct forensics on suspicious app installs

Sophisticated dropper campaigns like this highlight the ongoing challenge of securing official app stores against evolving malware families.

CATEGORIES:

EN|News|Security

Tags:

Comments are closed