Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    How Enterprises Ought to Harden Blockchain Apps in Cloud

    October 18, 2025

    Switchboard-Have an effect on: Emotion Notion Labels from Conversational Speech

    October 18, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»77 Malicious Android Apps With 19M Installs Focused 831 Banks Worldwide
    AI Ethics & Regulation

    77 Malicious Android Apps With 19M Installs Focused 831 Banks Worldwide

    Declan MurphyBy Declan MurphyAugust 27, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    77 Malicious Android Apps With 19M Installs Focused 831 Banks Worldwide
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Zscaler studies 77 Android apps on Google Play with 19 million installs unfold malware, hitting 831 banks and exposing customers to fraud and theft.

    A brand new investigation by Zscaler’s ThreatLabz group has revealed that 77 malicious apps with over 19 million installs have been delivering completely different malware households via the official Google Play Retailer.

    The analysis centered on a brand new an infection wave of the Anatsa (aka TeaBot) banking trojan, a dangerous program first recognized in 2020 that has advanced right into a extra harmful and complicated menace.

    The newest Anatsa variant has dramatically expanded its attain, now focusing on over 831 monetary establishments worldwide from the earlier depend of 650. The malware’s operators have additionally included new areas like Germany and South Korea, along with in style cryptocurrency platforms.

    Most of the decoy purposes, which have been designed to appear to be innocent doc readers, had individually racked up greater than 50,000 downloads, demonstrating the extensive attain of the marketing campaign.

    Anatsa installer behaviour as per anti-analysis checks outcomes (Supply: Zscaler)

    The malware operators, reportedly, use an app named ‘Doc Reader – File Supervisor’ as a decoy, which solely downloads the malicious Anatsa payload after set up to evade Google’s code evaluation.

    Additional analysis revealed that the apps downloaded from the official retailer are initially clear and performance as promised. Nonetheless, as soon as put in, the app quietly downloads the Anatsa malware disguised as a crucial replace. By tricking customers into enabling Android’s Accessibility Companies, the malware can automate its malicious actions.

    As soon as it has management, the malware steals monetary data, screens keystrokes and facilitates fraudulent transactions by displaying faux login pages that mimic the banking or monetary apps on a consumer’s system. When a consumer tries to log in, the knowledge is distributed on to the attackers.

    The malware can even evade safety evaluation by making its code troublesome to learn and by checking whether it is being run in a testing surroundings. This contains utilizing Knowledge Encryption Customary (DES) runtime decryption and performing emulation checks to bypass safety instruments. It makes use of a corrupted ZIP archive to cover an important malicious file, making it troublesome for traditional evaluation instruments to detect.

    Zscaler’s investigation discovered that whereas the vast majority of malicious apps contained adware, essentially the most incessantly discovered Android malware was Joker, current in virtually 1 / 4 of the analysed apps. The sort of malware is understood for its capability to steal contacts and system data, take screenshots, make calls, and even learn and ship textual content messages to subscribe customers to premium companies with out their consent.

    A smaller group of apps contained “maskware,” a kind of malware that capabilities as a reliable app whereas conducting malicious actions within the background, similar to stealing credentials and private information like location and SMS messages. A Joker malware variant referred to as Harly was additionally discovered, which avoids detection throughout the evaluation course of by having its malicious payload hidden deep inside the code of an in any other case legitimate-looking app.

    Anatsa Malware Targeting 831 Financial Institutions
    Supply: Zscaler

    As threats like this proceed to increase and unfold, they pose a rising threat to private privateness, monetary programs, and personal firms alike.

    “Android customers ought to all the time confirm the permissions that purposes request, and make sure that they align with the meant performance of the appliance,” the analysis concludes.

    An Skilled’s View: Reactive Defences and New Threats

    “Zscaler Menace Labs’ discovery is a powerful reminder that the safety posture of official app shops just like the Google Play Retailer is essentially reactive,” stated Mayank Kumar, Founding AI Engineer at DeepTempo. He famous that by the point these apps are eliminated, an unlimited variety of customers, on this case 19 million, are already compromised.

    Kumar defined that attackers have gotten extra inventive, utilizing techniques similar to embedding their code deep inside an app’s core to look benign throughout the evaluation course of. He cited the Harly variant for instance, noting that it makes use of layers of obfuscation to bypass safety checks.

    “With the appearance of AI, it would develop into even simpler for menace actors to design the multi-stage payloads and superior obfuscation wanted to defeat the scanning and signature-based detection programs that kind the core of app retailer defences,” he added.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    North Korean Hackers Mix BeaverTail and OtterCookie into Superior JS Malware

    October 17, 2025

    Attackers Exploit Zendesk Authentication Challenge to Flood Targets’ Inboxes with Company Notifications

    October 17, 2025
    Top Posts

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    By Declan MurphyOctober 18, 2025

    A brand new malvertising marketing campaign is benefiting from the recognition of Perplexity’s just lately…

    How Enterprises Ought to Harden Blockchain Apps in Cloud

    October 18, 2025

    Switchboard-Have an effect on: Emotion Notion Labels from Conversational Speech

    October 18, 2025

    Flexiv Forecasts the Way forward for Robotics at IROS 2025

    October 18, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.