ECONOMY & WORK
MONEY 101
NEWS
PERSONAL FINANCE
NET WORTH
About Us Contact Us Privacy Policy Terms of Use DMCA Opt-out of personalized ads
© Copyright 2023 Market Realist. Market Realist is a registered trademark. All Rights Reserved. People may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.
MARKETREALIST.COM / NEWS

Anatsa Banking Trojan Spreading Rampantly Through Google Play Store: All You Need to Know

The trojan uses the stolen information to perform fraud by launching the banking app and performing transactions on the victim's behalf.
PUBLISHED FEB 21, 2024
Cover Image Source: Threat actors are using malware droppers disguised as legitimate mobile apps (representative image) | Pexels | Photo by Negative Space
Cover Image Source: Threat actors are using malware droppers disguised as legitimate mobile apps (representative image) | Pexels | Photo by Negative Space

The dangerous banking trojan, Anatsa, is continuing to spread across countries through Google Play Store. Threat actors are using malware droppers disguised as legitimate mobile apps on the store to distribute the trojan to Android users. The trojan targets over 600 mobile banking applications worldwide and has amassed tens of thousands of installs via the application store in the past few months, per ThreatFabric. Here’s all you need to know about Anatsa banking trojan.



 

The malicious apps are disguised as legitimate-looking apps such as PDF viewers, editor apps, and office suites in the office/productivity category. In the latest Anatsa campaign, the malware operators used fake cleaner apps as well as those which promise to free up space on a device by deleting unnecessary files.

ThreatFabric's report highlighted an example of such an app named Phone Cleaner – File Explorer, which marked over 10,000 downloads on the Play Store. Another app called PDF Reader: File Manager also has more than 100,000 downloads, ThreatFabric told BleepingComputer.



 

Once these malicious apps are installed on the victim's device, the dropper apps request an external resource hosted on GitHub to download the Anatsa payloads disguised as text recognizer add-ons for apps such as Adobe Illustrator. Further, the banking trojan collects financial information such as bank account credentials, credit card details and payment information by employing phishing pages when the user attempts to launch their legitimate bank app.

As per reports, Anatsa targets nearly 600 financial apps of banking institutions from around the world. The trojan uses the stolen information to perform fraud by launching the banking app and performing transactions on the victim's behalf. The money-stealing process is automated and goes completely undetected. The stolen amounts are reportedly converted to cryptocurrency and passed through an extensive network of money mules to avoid detection.

The malware developers use a multi-staged infection process to avoid detection from the Play Store. The process includes downloading a DEX file from a remote location which retrieves code for executing malicious actions. When the droppers are uploaded to Google Play, they contain nothing that can flag them as suspicious. The fraudulent actions are executed only after the droppers are installed on a device.

A woman using an Macbook Pro as she uses Google play | Getty Images | Photo by studioEAST
A woman using an Macbook Pro as she uses Google play | Getty Images | Photo by studioEAST

Further, according to ThreatFabric, whenever the malicious app was removed from the store, the attackers returned quickly by uploading a new dropper under a new disguise. The report noted that the dropper applications often regularly reach the top 3 new free applications in Google Play.

The malware-spreading campaign has been going on for over four years and a recent campaign was reportedly launched last year. So far, victims across the European region have downloaded malware droppers over 100,000 times since November. In a previous campaign during the first half of 2023, the malware marked over 130,000 installations of its weaponized droppers for Anatsa from Google's Play Store. In total, Threatfabric estimates the download count to be about 150,000 for Anatsa droppers on Google Play. However, the researchers called it a conservative estimate and stated that the real figure would be closer to 200,000, in a BleepingComputer report.

In the first wave of the campaign, which surfaced in 2020, people across the US, Italy, the United Kingdom, France, Germany, and several other European countries were impacted. Further, as part of the recent campaign that started in November 2023, the attackers expanded their targets to countries like Slovakia, Slovenia, and Czechia.

MORE ON MARKET REALIST
The founder of 'Permaplug' had done his research on the Sharks to help make a decision.
6 hours ago
When the item turned out to quite a valuable artifact, Harrison refused to let it go.
8 hours ago
The Sharks formed teams and ditched their partners to get a deal with "The Woobles".
10 hours ago
With a tiny margin of four steps, the player won prizes worth $8,000 after a tense game.
1 day ago
The recall was issued amid reports of multiple deaths and over a dozen illnesses across 13 states.
1 day ago
The player celebrated her way to the stage and then got more than one reason to celebrate.
1 day ago
The investment turned out to fruitful as 'Simple Sugars' went on to make millions.
2 days ago
The long time host of the show expressed his love for the cast members of the show.
2 days ago
Fans took to Reddit to blast both the Bonus Round puzzle and Seacrest's mistake.
3 days ago
In the end, the founders of Turbo Trusser couldn't 'chicken out' of a deal with Chef Wonderful.
3 days ago
The entrepreneurs impressed all sharks with their chocolate flavored birthday treats.
4 days ago
The pristine collection of 'Magic Trading Cards' blew away the expert too.
4 days ago
The player's team members and Harvey kept laughing uncontrollably.
4 days ago
The autographed 1919 Cincinnati Reds Championship baseball turned out be a great investment.
4 days ago
The two cunning Sharks worked out a creative deal for the innovative product.
5 days ago
The guest was surprised that the person gifted her such a precious item.
5 days ago
The founders of "Slick Barrier" chose to put the Sharks in harms way to demonstrate their product.
6 days ago
The item that was rejected by the guest's family turned out to be worth tens of thousands of dollars.
6 days ago
Even host Drew Carey noted such a win hadn't happened since he took over the show in 2007.
6 days ago
The guest who paid $7,000 for the collection was delighted to get a hefty return.
7 days ago