Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play

Posted on July 8, 2025July 8, 2025 By CWS

Jul 08, 2025Ravie LakshmananMalware / Cellular Safety
Cybersecurity researchers have found an Android banking malware marketing campaign that has leveraged a trojan named Anatsa to focus on customers in North America utilizing malicious apps printed on Google’s official app market.
The malware, disguised as a “PDF Replace” to a doc viewer app, has been caught serving a misleading overlay when customers try and entry their banking software, claiming the service has been quickly suspended as a part of scheduled upkeep.
“This marks a minimum of the third occasion of Anatsa focusing its operations on cell banking clients in the USA and Canada,” Dutch cell safety firm ThreatFabric stated in a report shared with The Hacker Information. “As with earlier campaigns, Anatsa is being distributed through the official Google Play Retailer.”
Anatsa, additionally known as TeaBot and Toddler, has been recognized to be energetic since a minimum of 2020, sometimes delivered to victims through dropper apps.

Early final yr, Anatsa was discovered to have focused Android system customers in Slovakia, Slovenia, and Czechia by first importing benign apps masquerading as PDF readers and cellphone cleaners to the Play Retailer after which introducing malicious code every week after launch.
Like different Android banking trojans, Anatsa is able to offering its operators with options designed to steal credentials by overlay and keylogging assaults, and conduct System-Takeover Fraud (DTO) to provoke fraudulent transactions from sufferer’s gadgets.
ThreatFabric stated Anatsa campaigns comply with a predictable, however well-oiled, course of that includes establishing a developer profile on the app retailer after which publishing a authentic app that works as marketed.
“As soon as the applying positive aspects a considerable person base – typically within the hundreds or tens of hundreds of downloads – an replace is deployed, embedding malicious code into the app,” the corporate stated. “This embedded code downloads and installs Anatsa on the system as a separate software.”
The malware then receives a dynamic checklist of focused monetary and banking establishments from an exterior server, enabling the attackers to carry out credential theft for account takeover, keylogging, or absolutely automated transactions utilizing DTO.

A vital issue that permits Anatsa to evade detection in addition to keep a excessive success price is its cyclical nature the place the assaults are interspersed by intervals of no exercise.
The newly found app concentrating on North American audiences masquerades as a Doc Viewer (APK package deal title: “com.stellarastra.maintainer.astracontrol_managerreadercleaner”) and is printed by a developer named “Hybrid Vehicles Simulator, Drift & Racing.” Each the app and the related developer account are not accessible on the Play Retailer.
Statistics from Sensor Tower present that the app was first printed on Might 7, 2025, reaching the fourth spot within the “Prime Free – Instruments” class on June 29, 2025. It is estimated to have been downloaded round 90,000 occasions.
“This dropper adopted Anatsa’s established modus operandi: initially launched as a authentic app, it was remodeled right into a malicious one roughly six weeks after launch,” ThreatFabric stated. “The distribution window for this marketing campaign was brief but impactful, working from 24 to 30 June.”

The Anatsa variant, per the corporate, can be configured to focus on a broader set of banking apps in the USA, reflective of the malware’s growing give attention to exploiting monetary entities within the area.
One other intelligent characteristic integrated into the malware is its potential to show a pretend upkeep discover when making an attempt to entry the goal banking software. This tactic not solely conceals the malicious exercise occurring throughout the app, but in addition prevents clients from contacting the financial institution’s help crew, thereby delaying detection of economic fraud.
“The newest operation not solely broadened its attain but in addition relied on well-established ways geared toward monetary establishments within the area,” ThreatFabric stated. “Organizations within the monetary sector are inspired to evaluation the supplied intelligence and assess any potential dangers or impacts on their clients and programs.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Anatsa, Android, App, Banking, Fake, Google, Hits, PDF, Play, Trojan, Users

Post navigation

Previous Post: Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada
Next Post: DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass

Related Posts

5 BCDR Essentials for Effective Ransomware Defense The Hacker News
Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution The Hacker News
Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms The Hacker News
Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit The Hacker News
Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments The Hacker News
Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
  • Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
  • How to Test Website Security Using Free Tools
  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails
  • Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection
  • How to Test Website Security Using Free Tools
  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News