Home » Technology » Android Malware Wave: 77 Apps Delivering Banking Trojans & Joker

Android Malware Wave: 77 Apps Delivering Banking Trojans & Joker

Banking Trojan​ “Anatsa” Continues to Plague⁣ Google Play, Reaching 50,000 Users in Latest Campaign

San Francisco, CA – June 13, 2024 – A ‌persistent Android ‍banking trojan known ‍as Anatsa ⁢has once again infiltrated the⁤ Google Play ‌Store, ‌impacting‌ approximately 50,000⁢ users in‌ the United States⁤ with malicious applications, security researchers ‌at⁤ Zscaler have⁤ revealed. This latest⁢ wave of infections is part of a broader trend of malicious and adware apps exploiting the ​platform, with‍ a total ⁢of 77 identified apps racking up a⁤ combined 19 million downloads.

The Anatsa trojan‌ is designed to ‌steal ⁣banking credentials and ‌other sensitive information from infected devices. This recent campaign ⁢marks at least the fourth significant Anatsa-related incident on ⁢Google Play in the past⁣ year, demonstrating the malware’s adaptability and the ongoing challenges in⁤ securing the⁣ Android ecosystem.Zscaler’s‍ ThreatLabz team discovered the recent Anatsa-infected apps ⁤alongside a surge in adware, and also other malware families including “Joker,” “Harly,” and various “maskware” applications‍ -​ apps that disguise their true functionality. Notably, the ‍researchers observed ‍a decline in ‍the prevalence of malware ⁤families ⁢like ⁤facestealer and Coper.

“ThreatLabz identified a sharp‌ rise in adware applications ⁢on the Google Play Store alongside malware, such as Joker, Harly, and banking⁣ trojans‍ like Anatsa,” explained Zscaler researcher himanshu Sharma. “Conversely, there has been a noticeable decline in malware‍ families such as Facestealer and Coper.”

A History of Exploitation:

Anatsa ‍has repeatedly bypassed Google Play’s security measures through various tactics. Previous campaigns‍ include:

May 2024: A PDF and QR Code Reader attack resulting in approximately 70,000 infections. February ‍2024: A Phone Cleaner⁤ and ​PDF attack leading⁢ to ‌150,000 downloads.
March 2023: ⁢ A PDF Viewer attack achieving 30,000 installs, initially targeting users in‍ the US ⁣and UK with ‌banking information theft.

The malware typically disguises itself within seemingly legitimate applications, frequently enough utilizing tools and personalization apps‍ as a primary⁣ delivery method. Zscaler’s analysis indicates that the tools⁤ and personalization categories, alongside ⁤entertainment, photography, and design apps, represent the highest risk areas for ⁤potential malware infection.

Google’s Response & User Protection:

Following Zscaler’s report, Google has ⁢removed​ all ​identified malicious applications⁤ from the Play Store.However,the researchers⁣ emphasize ​the importance of proactive user protection.

Android users are strongly advised to ensure that Google⁢ Play Protect, the built-in malware scanner, ⁤is enabled on their devices. In the event of a suspected Anatsa infection,users should⁢ also immediately contact ‍their bank to secure possibly compromised ⁣e-banking‌ accounts and credentials.

mitigating ‌the Risk:

Security experts recommend the following‍ precautions to⁢ minimize the risk of ‍downloading malicious ‍apps from Google ⁣Play:

Trust Reputable Publishers: Prioritize apps from well-known and established developers.
Review⁣ User feedback: Read multiple user reviews before‍ downloading‍ any submission.
Limit Permissions: Carefully review the permissions requested by an app and only ⁢grant access that is directly ‍relevant to its core functionality. Be wary of apps requesting excessive or‌ unnecessary⁣ permissions.The ongoing presence of Anatsa and other malware on Google Play underscores the ⁣constant arms ⁢race between security researchers and ‍malicious actors,and the need for both platform providers and users to remain vigilant.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.