Dubbed Anatsa (also known as TeaBot), the malware targets global financial institutions through a multi-stage infection process. It deploys fake login overlays and abuses accessibility services to steal credentials and execute unauthorized transactions.
According to the Zscaler ThreatLabz post shared on X, the malicious app, disguised as a “File Manager and Document Reader,” functioned as a dropper, a seemingly benign application that retrieves and installs additional payloads from remote servers.
The app prompted users to download a fraudulent “update” masquerading as a necessary add-on upon installation. This update, hosted on GitHub repositories, contained the Anatsa banking trojan.
Anatsa employs reflection-based code execution to dynamically load malicious Dalvik Executable (DEX) files, which evade static analysis tools by decrypting payloads only at runtime.
The malware performs anti-emulation checks to detect sandboxed environments, delaying malicious activity until it confirms a genuine device. Once active, it requests critical permissions, including:
The trojan then establishes communication with command-and-control (C2) servers, transmitting device metadata and receiving targeted banking app profiles.
For each detected financial app (e.g., PayPal, HSBC, Santander), Anatsa injects a counterfeit login overlay, capturing credentials directly from unsuspecting users.
Anatsa’s latest campaign has primarily targeted users in Europe, including Slovakia, Slovenia, and Czechia, though its infrastructure supports expansion into the U.S., South Korea, and Singapore.
The malware’s target list encompasses over 600 banking and cryptocurrency apps, enabling threat actors to conduct on-device fraud (ODF) by initiating unauthorized transfers via automated transaction systems (ATS).
To mitigate risks, users should:
The Anatsa campaign underscores persistent gaps in app store security, particularly regarding delayed payload attacks.
While Google has removed the identified dropper, similar threats remain prevalent, often exploiting file managers and utility apps to evade suspicion.
For end-users, vigilance and adherence to basic security hygiene remain critical defenses against evolving mobile threats.
Indicators of Compromise (IoCs):
Network:
hxxps://docsresearchgroup[.]com
http://37.235.54[.]59/
http://91.215.85[.]55:85
Sample MD5s:
a4973b21e77726a88aca1b57af70cc0a
ed8ea4dc43da437f81bef8d5dc688bdb
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
The post Android App With 220,000+ Downloads From Google Play Installs Banking Trojan appeared first on Cyber Security News.
Full spoilers follow for Daredevil: Born Again Season 2, Episode 8, “The Southern Cross," which…
I first got into reading romantasy books after a friend of mine recommended Fourth Wing…
IO Interactive has assured fans that there will be more Hitman adventures, and the team…
Diablo 4 fans have finally discovered the game's secret cow level, though some fans are…
INDIANAPOLIS, Ind. (WOWO) — A federal judge has cleared the way for a religious freedom…
INDIANAPOLIS, Ind. (WOWO) — The generosity of FOX59/CBS4 viewers will help provide thousands of meals…
This website uses cookies.