Malicious Android App on Google Play Compromises 220,000+ Devices

Security researchers at ThreatLabz have recently unveiled a complex malware campaign that has been operating through the Google Play Store. This campaign has cleverly utilized a seemingly innocuous application to disseminate the Anatsa banking trojan, also known as TeaBot. The malicious app, which masqueraded as a file manager and document reader, amassed over 220,000 downloads before its removal, marking it as one of the most significant Android threats identified in 2025.

Discovery and Deployment of the Malicious Application

During routine analysis of Google Play offerings, ThreatLabz detected the fraudulent application. The app presented itself as a functional file management tool, complete with document preview capabilities and cloud storage integration. This legitimate facade allowed it to evade automated security checks during the initial vetting process.

Upon installation, the app initiated a multi-stage payload retrieval process. Users were prompted to grant accessibility permissions under the guise of enhancing functionality. Once authorized, the application connected to a command-and-control server to download the Anatsa payload, effectively turning infected devices into instruments for financial fraud.

Technical Analysis of the Anatsa Banking Trojan

Anatsa employs a combination of overlay attacks and credential harvesting techniques. When users launch their banking applications, the trojan superimposes fake login screens that closely resemble legitimate interfaces. Captured credentials are then transmitted to servers controlled by the attackers. ThreatLabz’s analysis confirms that Anatsa targets financial institutions across North America, Europe, and Asia, with a particular emphasis on mobile banking platforms.

The malware utilizes advanced evasion techniques, including delayed payload activation and encrypted communication channels. After infection, it establishes persistence by repeatedly checking for accessibility service permissions while disguising its presence with generic system application icons.

Geographic Distribution and Target Demographics

While the complete geographic distribution is still under investigation, initial telemetry data indicates concentrated infection rates in regions with high mobile banking adoption. The application’s multilingual interface—supporting English, Spanish, German, and French—suggests a broad targeting strategy aimed at a global user base.

Google removed the application from the Play Store within 48 hours of ThreatLabz’s disclosure. However, the app’s prolonged presence—estimated at eight weeks before detection—raises concerns regarding gaps in automated screening processes. Google has since initiated a mass uninstallation campaign for affected devices, although manual removal remains necessary for users who had disabled automatic updates.

Security professionals recommend that affected users:

  1. Perform factory resets to eliminate residual malware components
  2. Monitor financial accounts for unauthorized transactions
  3. Enable Google Play Protect with real-time scanning
  4. Avoid granting accessibility permissions to unfamiliar applications

Organizations are encouraged to implement mobile threat defense solutions capable of detecting overlay attacks and anomalous network traffic patterns. Ongoing investigations aim to identify the threat actors behind this campaign, with preliminary evidence suggesting connections to Eastern European cybercrime syndicates. As mobile banking continues to expand, such attacks underscore the critical importance of user education and multi-layered security approaches in mitigating financial cyberthreats.

AppWizard
Malicious Android App on Google Play Compromises 220,000+ Devices