10,000 Users Exposed As Fake Document Reader App Delivers Anatsa Banking Trojan

Security researchers from ThreatLabz have recently identified a troubling threat lurking within the Google Play Store. A seemingly innocuous document reader application, crafted to resemble a typical file management tool, was discovered to be stealthily delivering the notorious Anatsa Android banking trojan.

Before Google took action to remove the application, it had already amassed over 10,000 downloads, placing countless users in jeopardy of financial fraud and data breaches.

The malicious app, which was listed under the package name com.groundstation.informationcontrol.filestationbrowsefilesreaddocs, cleverly disguised itself as a harmless utility for browsing and reading documents. This tactic, known as the “dropper” technique, is frequently employed by threat actors to bypass Google Play Protect’s initial security checks. By keeping the malicious code hidden from the initial download, the application appears legitimate during the review process.

Upon downloading and launching the fake document reader, the app triggers the second phase of the attack in the background. It connects to an external server to retrieve the actual malware payload, camouflaging the dangerous file as a simple text document to evade detection on the network.

The Infection Chain and Threat Impact

The Anatsa banking trojan represents a highly advanced form of Android malware specifically engineered to pilfer financial information and drain bank accounts. Once the fake document reader installs the Anatsa payload, the malware promptly seeks to obtain elevated permissions on the victim’s device.

It often exploits Android’s Accessibility Services, granting the malware the ability to read screen content, capture keystrokes, and interact with the device without the user’s awareness.

Once fully operational, Anatsa surveils the device for specific banking and financial applications. When a user accesses their legitimate banking app, the Trojan executes an invisible overlay attack, presenting a counterfeit login screen directly over the authentic application. This deception lures users into entering their usernames, passwords, and multi-factor authentication codes, which are then captured by the attackers.

Because Anatsa operates directly on the victim’s trusted device, it frequently circumvents traditional fraud detection systems employed by banks. Attackers can initiate unauthorized money transfers directly from the compromised phone, making these transactions appear to be sanctioned by the account owner.

Users who have downloaded this counterfeit document reader are strongly urged to delete the app immediately, monitor their financial accounts for any unusual activity, and consider resetting their device passwords.

Indicators Of Compromise (IoCs)

Cybersecurity teams and IT administrators are encouraged to utilize the following technical indicators provided by ThreatLabz to identify potential infections and block malicious traffic within their networks:

Indicator Type Value
Anatsa Installer SHA256 5c9b09819b196970a867b1d459f9053da38a6a2721f21264324e0a8ffef01e20
Payload URL http://23.251.108[.]10:8080/privacy.txt
Payload SHA256 Hash 88fd72ac0cdab37c74ce14901c5daf214bd54f64e0e68093526a0076df4e042f
Command and Control (C2) Server http://172.86.91[.]94/api/
Command and Control (C2) Server http://193.24.123[.]18:85/api/

Follow us on Google News, LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

AppWizard
10,000 Users Exposed As Fake Document Reader App Delivers Anatsa Banking Trojan