Description

A malicious Android application recently infiltrated the Google Play Store by presenting itself as a trusted document reader and file manager, but its hidden purpose was to deliver the Anatsa banking trojan to unsuspecting users. The fake app, identified by Zscaler ThreatLabz as “Document Reader – File Manager” from developer ISTOQMAH, managed to stay active long enough to surpass 50,000 downloads, persuading users to allow permissions that ultimately risk their financial data. Anatsa, also called TeaBot, is a well-known banking malware first detected in 2020, designed to steal credentials, monitor keystrokes, and initiate fraudulent transactions against targeted financial services. The latest wave has broadened its reach to hundreds of banks worldwide, entering new geographical areas including Germany and South Korea, and even expanding toward cryptocurrency accounts. With sophisticated evasion methods such as encrypted payloads, anti-emulation checks, and hidden malicious code, the Trojan makes detection significantly difficult for security scanners. While the dropper app appears to function normally by letting users open PDFs and manage files, it secretly communicates with a remote server to download the full malware as a fake update. If the security checks pass, Anatsa activates by exploiting accessibility features, granting itself dangerous privileges like overlaying screens on top of banking apps to steal login details without user awareness, while still pretending to operate as a legitimate tool. This case demonstrates the ongoing threat of malware spreading through trusted app stores using productivity-based disguises. Cyber experts note that dozens of similar apps have recently been removed after recording millions of installations globally. To minimize risk, users are encouraged to verify app credibility, review permissions carefully, and rely on Play Protect and reputable mobile security tools, while organizations should monitor relevant threat indicators for proactive defense.