Over 90 malicious Android apps were discovered on Google Play, collectively installed over 5.5 million times, delivering malware and adware. Among these, the Anatsa banking trojan, also known as “Teabot,” has been particularly active, targeting over 650 financial applications across Europe, the US, the UK, and Asia to steal e-banking credentials and perform fraudulent transactions.
In February 2024, Threat Fabric reported that Anatsa had infected at least 150,000 devices via Google Play through decoy productivity apps. Recently, Zscaler identified that Anatsa returned to the app store, distributed via two new decoy applications: ‘PDF Reader & File Manager’ and ‘QR Reader & File Manager,’ which had already garnered 70,000 installations, indicating a significant security risk.
Anatsa dropper apps evade detection using a sophisticated multi-stage payload loading mechanism involving four distinct steps, including downloading malicious code and performing anti-analysis checks. Once active, the malware uploads configuration data, scans app results, and downloads targeted injections based on the victim’s location and profile, effectively compromising the device.
Other threats identified on Google Play include malware families such as Joker, Facestealer, Anatsa, Coper, and various adware, with Anatsa and Coper being notably dangerous despite their lower installation numbers. Users are advised to scrutinize app permissions, particularly those requesting access to high-risk activities like Accessibility Service, SMS, and contacts list. While the two Anatsa apps found by Zscaler have been removed, the full list of malicious apps has not been disclosed.