Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anatsa Android Banking Trojan Now Targeting 830 Financial Apps

Posted on August 25, 2025August 25, 2025 By CWS

The Anatsa Android banking trojan has expanded its goal checklist and now has over 830 monetary functions in its crosshairs, cybersecurity agency Zscaler warns.

Lively since 2020, Anatsa permits its operators to take over contaminated gadgets and carry out fraudulent transactions and different varied actions on behalf of their victims.

Final 12 months, the trojan was seen focusing on over 600 monetary functions, after increasing to a number of European nations.

Now, it is usually going after cell customers in Germany and South Korea, and is focusing on over 150 new banking and cryptocurrency functions, Zscaler stories.

The malware was seen being distributed by way of decoy functions out there by way of the official Google Play retailer, a few of which have amassed over 50,000 downloads.

After set up, the decoy functions hook up with the trojan’s command-and-control (C&C) server to silently fetch a malicious payload posing as an replace.

The functions embrace a number of anti-analysis and anti-detection strategies, decrypting strings at runtime utilizing a dynamically generated Information Encryption Normal (DES) key, performing emulation and system mannequin checks, and periodically altering the bundle identify and set up hash.

As soon as up and working on a tool, Anatsa requests accessibility permissions, and routinely permits all permissions in its manifest file, which permits it to show overlays on prime of functions, tamper with notifications, and obtain and browse SMS messages.Commercial. Scroll to proceed studying.

The malware can obtain instructions from its C&C server, and shows pretend banking login pages to steal credentials. The pages for a number of the focused functions are at present incomplete, Zscaler says.

The safety agency says it recognized and reported to Google 77 nefarious functions that distributed Anatsa and different malware households and which had over 19 million collective downloads. Most of those functions distributed adware (66.4%), and the Joker malware (24.7%).

“Anatsa continues to evolve and enhance with anti-analysis strategies to raised evade detection. […] Android customers ought to at all times confirm the permissions that functions request, and be sure that they align with the supposed performance of the applying,” Zscaler notes.

Associated: Godfather Android Trojan Creates Sandbox on Contaminated Units

Associated: ‘Crocodilus’ Android Banking Trojan Permits Gadget Takeover, Information Theft

Associated: Coyote Banking Trojan First to Abuse Microsoft UIA

Associated: Google Says Android pKVM Earns Highest Degree of Safety Assurance

Security Week News Tags:Anatsa, Android, Apps, Banking, Financial, Targeting, Trojan

Post navigation

Previous Post: CISA Requests Public Feedback on Updated SBOM Guidance
Next Post: Insights from 160 Million Attack Simulations

Related Posts

Air France, KLM Say Hackers Accessed Customer Data Security Week News
VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched Security Week News
Critical Vulnerabilities Patched in Sophos Firewall Security Week News
eSIM Hack Allows for Cloning, Spying  Security Week News
Companies Warned of Commvault Vulnerability Exploitation Security Week News
ConnectWise Discloses Suspected State-Sponsored Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • Fluent Bit Vulnerabilities Expose Cloud Services to Takeover
  • WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
  • Alumni, Student, and Staff Information Stolen From Harvard University
  • Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely
  • Fluent Bit Vulnerabilities Expose Cloud Services to Takeover
  • WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark