Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anatsa Android Banking Trojan Now Targeting 830 Financial Apps

Posted on August 25, 2025August 25, 2025 By CWS

The Anatsa Android banking trojan has expanded its goal checklist and now has over 830 monetary functions in its crosshairs, cybersecurity agency Zscaler warns.

Lively since 2020, Anatsa permits its operators to take over contaminated gadgets and carry out fraudulent transactions and different varied actions on behalf of their victims.

Final 12 months, the trojan was seen focusing on over 600 monetary functions, after increasing to a number of European nations.

Now, it is usually going after cell customers in Germany and South Korea, and is focusing on over 150 new banking and cryptocurrency functions, Zscaler stories.

The malware was seen being distributed by way of decoy functions out there by way of the official Google Play retailer, a few of which have amassed over 50,000 downloads.

After set up, the decoy functions hook up with the trojan’s command-and-control (C&C) server to silently fetch a malicious payload posing as an replace.

The functions embrace a number of anti-analysis and anti-detection strategies, decrypting strings at runtime utilizing a dynamically generated Information Encryption Normal (DES) key, performing emulation and system mannequin checks, and periodically altering the bundle identify and set up hash.

As soon as up and working on a tool, Anatsa requests accessibility permissions, and routinely permits all permissions in its manifest file, which permits it to show overlays on prime of functions, tamper with notifications, and obtain and browse SMS messages.Commercial. Scroll to proceed studying.

The malware can obtain instructions from its C&C server, and shows pretend banking login pages to steal credentials. The pages for a number of the focused functions are at present incomplete, Zscaler says.

The safety agency says it recognized and reported to Google 77 nefarious functions that distributed Anatsa and different malware households and which had over 19 million collective downloads. Most of those functions distributed adware (66.4%), and the Joker malware (24.7%).

“Anatsa continues to evolve and enhance with anti-analysis strategies to raised evade detection. […] Android customers ought to at all times confirm the permissions that functions request, and be sure that they align with the supposed performance of the applying,” Zscaler notes.

Associated: Godfather Android Trojan Creates Sandbox on Contaminated Units

Associated: ‘Crocodilus’ Android Banking Trojan Permits Gadget Takeover, Information Theft

Associated: Coyote Banking Trojan First to Abuse Microsoft UIA

Associated: Google Says Android pKVM Earns Highest Degree of Safety Assurance

Security Week News Tags:Anatsa, Android, Apps, Banking, Financial, Targeting, Trojan

Post navigation

Previous Post: CISA Requests Public Feedback on Updated SBOM Guidance
Next Post: Insights from 160 Million Attack Simulations

Related Posts

Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack Security Week News
Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers Security Week News
US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes Security Week News
Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black Security Week News
CISA Warns of Attacks Exploiting N-able Vulnerabilities Security Week News
Thousands of SaaS Apps Could Still Be Susceptible to nOAuth Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News