More than 800 banking apps are faked, malware attacks rampantly on Android

29/08/2025 3

A recent cybersecurity incident has shocked the tech community: more than 77 malicious apps have infiltrated the Google Play store.

More than 800 banking apps are faked, malware attacks rampantly on Android

 

In the digital age, smartphones are not only a communication tool but also an electronic wallet, mobile bank and a repository of extremely important personal information. Therefore, they have become a lucrative target for increasingly sophisticated cyber attacks. A recent cyber security event has shocked the technology community: more than 77 malicious applications have infiltrated the Google Play store, bypassing Google's layers of protection and silently spreading the Anatsa banking trojan to more than 19 million Android devices worldwide.

This incident is more than just a security incident, it’s a wake-up call about the increasingly unpredictable threats posed by mobile malware. As people increasingly rely on online financial services, banking malware like Anatsa is more dangerous than ever. To better understand the severity of this attack, we’ll take a look at how the malware works, what its consequences are, and how you can protect your devices and accounts from similar threats in the future.

1. Anatsa – Dangerous Banking Trojan Returns

According to a detailed report from cybersecurity experts at Zscaler, Anatsa, also known as TeaBot, is not a new type of malware, but this new version has raised the danger to a whole new level. Previously, Anatsa was discovered and caused a lot of damage, but it temporarily calmed down after strong crackdowns from Google and security companies. However, the hackers behind Anatsa did not give up and continued to develop new variants, making this malware increasingly difficult to detect and capable of wider attacks.

Alarmingly, Anatsa can now spoof the interfaces of over 800 different banking and financial applications around the world, up from 600 targeted applications last year. This means that its reach has expanded dramatically, directly threatening hundreds of millions of potential users. When a user opens any of the targeted banking applications, Anatsa can instantly insert a fake login interface that looks exactly like the real thing to trick them into giving up their login credentials.

This is what makes Anatsa one of the most dangerous banking trojans out there. Not only does it steal login credentials, it can also track user activity, remotely take control of devices, and even interfere with real-time banking transactions. Once infected, victims lose almost all control over their financial accounts.

2. Large-scale and sophisticated attack campaign

So how did Anatsa get past Google Play’s multi-layered security? This is the part that worries security experts. The malware campaign is extremely sophisticated, with two distinct stages designed to avoid detection during the review process.

In the first stage, hackers create “decoy” applications in the form of popular utilities that almost everyone needs to use, such as PDF readers, flashlights, QR code scanners, or other small utility applications. More importantly, these applications are initially completely “clean”, without any malicious code. This makes it easy for them to bypass Google’s automatic security scanning system and even receive many positive reviews from users due to their normal operation.

Once the app has a certain number of users and has gained trust, the second phase begins. Hackers silently push a fake “update” to the user’s device. This is actually an installation package containing the Anatsa trojan. Since users are used to accepting any update to improve the app, few would suspect that this is the beginning of a cyberattack.

Once successfully infiltrated, Anatsa operates silently and is very difficult to detect. It constantly monitors the device's activity, paying special attention to banking and financial applications. When the victim opens a targeted application, Anatsa immediately inserts a fake interface layer, asking the user to enter a username and password. All this sensitive data is immediately sent to the hacker's control server. With valid login information, the attacker can easily drain all the money in the account or perform other illegal transactions.

3. Consequences and alarming spread

According to statistics from Zscaler, more than 19 million Android devices worldwide have been affected by this attack campaign. This is a huge number, especially considering that all of these malicious apps are distributed through the official Google Play store.

In addition to Anatsa, researchers found other malware among the 77 removed apps, including Joker and Harly, which are known for stealing contacts and automatically signing users up for expensive paid services without their knowledge. This shows that the Android ecosystem is facing multiple parallel threats that go beyond just losing money from bank accounts, but can also lead to personal data loss, tracking, and multi-layered financial fraud.

The sophistication of this campaign also raises big questions about the effectiveness of the security measures currently in place on Google Play. Although Google has continuously improved its malware scanning and app moderation systems, hackers still find ways to circumvent the rules by releasing “clean” apps first and then injecting malware during the update stage. This is a huge challenge for app distribution platforms.

4. How to protect yourself?

Faced with increasingly sophisticated threats like the Anatsa trojan, proactively raising awareness and equipping yourself with basic security knowledge is a vital factor for Android users to protect themselves from cyber risks. Not only cybersecurity experts, but even Google has continuously warned about the trend of increasingly difficult-to-detect malware that can hide under the guise of seemingly harmless applications. To protect the safety of personal and financial data, you should apply the following comprehensive measures:

Limit the installation of unnecessary applications.
Each application on the phone has certain access rights to system resources, even sensitive user data. Installing unnecessary applications indiscriminately only increases the risk of "back doors" for hackers to exploit. Make it a habit to periodically review the application list, remove unused or unknown applications. A compact smartphone with necessary and reliable applications will significantly reduce the risk of malware infection.

Check the developer information and reviews of the app
Before downloading a new app, don’t rush to click “Install” just because it has a lot of downloads or a nice interface. You need to consider carefully:

  • Who is the developer? Is it a reputable name or brand in the industry?
  • Do they have an official website, transparent contact information, and other reputable apps on the store?
  • Are user reviews authentic?

Be wary of apps with too many identical 5-star reviews or vague, repetitive reviews, which may be fake reviews bought to create fake credibility. It's better to prioritize apps that are recommended by the tech community, security sites, or reputable press.

Enable and Take Advantage of Multiple Layers of Protection
Google Play Protect is a built-in security tool on Android that scans and alerts you to potentially malicious apps. However, Play Protect isn’t always fast enough to detect every new variant of trojan or spyware. So, in addition to enabling Play Protect, you should install an antivirus or mobile security app from reputable companies like Kaspersky, Bitdefender, ESET, Avast, etc. These tools often provide more layers of protection: real-time malware scanning, phishing website warnings, online transaction protection, and even locking sensitive apps with a passcode.

Be Careful with App Permissions
It’s unusual for a camera app to ask for access to contacts, messages, or accessibility services. Before installing or when an app asks for permission, ask yourself: “Does this app really need this permission to function?” If the answer is “no,” decline. Android allows users to have granular control over permissions, so review them regularly and revoke unnecessary permissions to minimize risk.

Keep your operating system and security patches
up to date Hackers often exploit known software vulnerabilities to attack devices. Operating system updates and security patches from manufacturers are released to fix these vulnerabilities. So, turn on automatic updates or check manually to make sure your device is always up to date. Also, if your phone is too old to receive security updates, consider upgrading your device to stay safe.

Beware of strange links and files.
Many malware spreads not only through apps in the store, but also through SMS messages, emails, and social media platforms. If you receive a link from a stranger (or even from a friend with unusual content), do not click it. Verify the link is safe using online URL checking services or ask the sender directly.

Enable multi-factor authentication (MFA) for important accounts
Even if a hacker gets your password, MFA (requiring an OTP or confirmation from another device) makes it harder to take over your account. Turn on MFA for your email, bank accounts, and other important services.

Increase personal security awareness
Finally, the human element is always the weakest link in the security chain. Be proactive in learning about new forms of attack, how to recognize signs of malware, and share security knowledge with your loved ones. A community of vigilant and knowledgeable users will be the strongest "firewall" against all tricks of cybercriminals.

5. Conclusion

The Anatsa campaign on 77 Google Play apps is a clear demonstration that cyber threats are becoming more sophisticated and unpredictable. It reminds us that even official app distribution platforms cannot guarantee absolute safety. Users need to change their technology usage habits, stay vigilant and proactively protect themselves.

In the future, big tech companies like Google will certainly have to continue to invest heavily in security systems, develop smarter censorship mechanisms, and be able to detect unusual behavior after the application is released. However, the most important thing is still user awareness. Only when each individual clearly understands the risks and takes the necessary protective measures can we minimize the serious consequences caused by mobile malware.

 
Sadesign Co., Ltd. provides the world's No. 1 warehouse of cheap copyrighted software with quality: Panel Retouch, Adobe Photoshop Full App, Premiere, Illustrator, CorelDraw, Chat GPT, Capcut Pro, Canva Pro, Windows Copyright Key, Office 365 , Spotify, Duolingo, Udemy, Zoom Pro...
Contact information
SADESIGN software Company Limited
 
Sadesign Co., Ltd. provides the world's No. 1 warehouse of cheap copyrighted software with quality: Panel Retouch, Adobe Photoshop Full App, Premiere, Illustrator, CorelDraw, Chat GPT, Capcut Pro, Canva Pro, Windows Copyright Key, Office 365 , Spotify, Duolingo, Udemy, Zoom Pro...
Contact information
SADESIGN software Company Limited
Hotline
Confirm Reset Key/Change Device

Are you sure you want to Reset Key/Change Device on this Key?

The computer that has this Key activated will be removed and you can use this Key to activate it on any computer.