Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anatsa Android Banking Trojan Now Targeting 830 Financial Apps

Posted on August 25, 2025August 25, 2025 By CWS

The Anatsa Android banking trojan has expanded its goal checklist and now has over 830 monetary functions in its crosshairs, cybersecurity agency Zscaler warns.

Lively since 2020, Anatsa permits its operators to take over contaminated gadgets and carry out fraudulent transactions and different varied actions on behalf of their victims.

Final 12 months, the trojan was seen focusing on over 600 monetary functions, after increasing to a number of European nations.

Now, it is usually going after cell customers in Germany and South Korea, and is focusing on over 150 new banking and cryptocurrency functions, Zscaler stories.

The malware was seen being distributed by way of decoy functions out there by way of the official Google Play retailer, a few of which have amassed over 50,000 downloads.

After set up, the decoy functions hook up with the trojan’s command-and-control (C&C) server to silently fetch a malicious payload posing as an replace.

The functions embrace a number of anti-analysis and anti-detection strategies, decrypting strings at runtime utilizing a dynamically generated Information Encryption Normal (DES) key, performing emulation and system mannequin checks, and periodically altering the bundle identify and set up hash.

As soon as up and working on a tool, Anatsa requests accessibility permissions, and routinely permits all permissions in its manifest file, which permits it to show overlays on prime of functions, tamper with notifications, and obtain and browse SMS messages.Commercial. Scroll to proceed studying.

The malware can obtain instructions from its C&C server, and shows pretend banking login pages to steal credentials. The pages for a number of the focused functions are at present incomplete, Zscaler says.

The safety agency says it recognized and reported to Google 77 nefarious functions that distributed Anatsa and different malware households and which had over 19 million collective downloads. Most of those functions distributed adware (66.4%), and the Joker malware (24.7%).

“Anatsa continues to evolve and enhance with anti-analysis strategies to raised evade detection. […] Android customers ought to at all times confirm the permissions that functions request, and be sure that they align with the supposed performance of the applying,” Zscaler notes.

Associated: Godfather Android Trojan Creates Sandbox on Contaminated Units

Associated: ‘Crocodilus’ Android Banking Trojan Permits Gadget Takeover, Information Theft

Associated: Coyote Banking Trojan First to Abuse Microsoft UIA

Associated: Google Says Android pKVM Earns Highest Degree of Safety Assurance

Security Week News Tags:Anatsa, Android, Apps, Banking, Financial, Targeting, Trojan

Post navigation

Previous Post: SASE Company Netskope Files for IPO
Next Post: Insights from 160 Million Attack Simulations

Related Posts

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users Security Week News
Chain IQ, UBS Data Stolen in Ransomware Attack Security Week News
Critical Citrix NetScaler Flaw Exploited as Zero-Day Security Week News
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass Security Week News
Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
Canadian Airline WestJet Hit by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pakistani Hackers Back at Targeting Indian Government Entities
  • Threat Actors Weaponizing Windows Scheduled Tasks to Establish Persistence Without Requiring Extra Tools
  • Chip Programming Firm Data I/O Hit by Ransomware
  • Insights from 160 Million Attack Simulations
  • Anatsa Android Banking Trojan Now Targeting 830 Financial Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pakistani Hackers Back at Targeting Indian Government Entities
  • Threat Actors Weaponizing Windows Scheduled Tasks to Establish Persistence Without Requiring Extra Tools
  • Chip Programming Firm Data I/O Hit by Ransomware
  • Insights from 160 Million Attack Simulations
  • Anatsa Android Banking Trojan Now Targeting 830 Financial Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News