Skip to main content

Malicious apps with +19M installs removed from Google Play because spreading Anatsa banking trojan and other malware

Medium
Published: Mon Aug 25 2025 (08/25/2025, 21:00:34 UTC)
Source: Reddit InfoSec News

Description

Malicious apps with +19M installs removed from Google Play because spreading Anatsa banking trojan and other malware Source: https://securityaffairs.com/181528/malware/malicious-apps-with-19m-installs-removed-from-google-play-because-spreading-anatsa-banking-trojan-and-other-malware.html

AI-Powered Analysis

AILast updated: 08/25/2025, 21:03:41 UTC

Technical Analysis

This threat involves a set of malicious Android applications that were available on the Google Play Store and collectively amassed over 19 million installs before being removed. These apps were distributing the Anatsa banking trojan along with other malware variants. Anatsa is a sophisticated banking trojan primarily targeting Android devices, designed to steal sensitive financial information such as banking credentials, credit card details, and two-factor authentication tokens. It achieves this by overlaying fake login screens on legitimate banking apps, intercepting SMS messages, and capturing keystrokes. The malware often gains extensive permissions on infected devices, enabling it to monitor user activity and exfiltrate data stealthily. The presence of these apps on the official Google Play Store indicates that the attackers employed advanced evasion techniques to bypass Google's security vetting processes, such as using obfuscation, delayed activation of malicious payloads, or dynamic code loading. Although the apps have been removed, the widespread installation base suggests a significant number of potentially compromised devices remain active. The lack of known exploits in the wild beyond these apps implies that the threat is primarily through user installation rather than remote exploitation. The minimal discussion on Reddit and the medium severity rating suggest that while the threat is serious, it may not be currently widespread or actively exploited at scale beyond the initial infection vector.

Potential Impact

For European organizations, the impact of this threat is multifaceted. Employees using Android devices for work or personal banking could have their credentials stolen, leading to unauthorized access to corporate financial accounts or personal accounts that could be leveraged for social engineering attacks. The theft of two-factor authentication tokens further exacerbates the risk by bypassing an important security layer. Financial losses could occur both directly through fraudulent transactions and indirectly through remediation costs, reputational damage, and regulatory penalties under GDPR if personal data is compromised. Additionally, compromised devices could serve as entry points for lateral movement within corporate networks if connected to enterprise resources. The threat also undermines trust in mobile applications and app marketplaces, potentially affecting mobile banking adoption and digital transformation initiatives within European financial institutions.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy. First, enforce strict mobile device management (MDM) policies that restrict installation of apps to trusted sources and whitelist approved applications. Employ mobile threat defense (MTD) solutions capable of detecting and blocking known banking trojans like Anatsa. Educate employees about the risks of installing apps from unofficial sources and the importance of scrutinizing app permissions. Encourage the use of hardware-based or app-based multi-factor authentication methods that are resistant to interception by malware. Regularly monitor network traffic for anomalous behavior indicative of data exfiltration from mobile devices. Collaborate with financial institutions to establish rapid response protocols for suspected credential compromise. Finally, advocate for enhanced app vetting processes with platform providers and report suspicious apps promptly to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
InfoSecNews
Reddit Score
1
Discussion Level
minimal
Content Source
reddit_link_post
Domain
securityaffairs.com
Newsworthiness Assessment
{"score":36.1,"reasons":["external_link","newsworthy_keywords:malware,trojan,banking trojan","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["malware","trojan","banking trojan"],"foundNonNewsworthy":[]}
Has External Source
true
Trusted Domain
false

Threat ID: 68accf71ad5a09ad004f8fce

Added to database: 8/25/2025, 9:02:41 PM

Last enriched: 8/25/2025, 9:03:41 PM

Last updated: 8/29/2025, 2:13:29 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats