Sunday, April 13, 2025
HomeAndroidMalicious Android App on Google Play Compromises 220,000+ Devices

Malicious Android App on Google Play Compromises 220,000+ Devices

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at ThreatLabz recently uncovered a sophisticated malware campaign operating through the Google Play Store, leveraging a seemingly benign application to distribute the Anatsa banking trojan (also known as TeaBot).

The malicious app, disguised as a file manager and document reader, accumulated over 220,000 downloads before its removal, marking one of the most significant Android-based threats identified in 2025.

Discovery and Deployment of the Malicious Application

ThreatLabz detected the fraudulent application during routine analysis of Google Play offerings.

- Advertisement - Google News

The app presented itself as a functional file management tool, complete with document preview capabilities and cloud storage integration.

This legitimate facade allowed it to bypass automated security checks during the initial vetting process.

Upon installation, the app executed a multi-stage payload retrieval process. Users were prompted to grant accessibility permissions under the guise of enhancing functionality.

Once authorized, the application connected to a command-and-control server to download the Anatsa payload, effectively transforming infected devices into vectors for financial fraud.

Technical Analysis of the Anatsa Banking Trojan

Anatsa operates through a combination of overlay attacks and credential harvesting. When users launch banking applications, the trojan superimposes fake login screens identical to legitimate interfaces.

Captured credentials are then transmitted to attacker-controlled servers.

ThreatLabz analysis confirms Anatsa targets financial institutions across North America, Europe, and Asia, with particular focus on mobile banking platforms.

The malware incorporates advanced evasion techniques, including delayed payload activation and encrypted communication channels.

Post-infection, it establishes persistence through repeated checks for accessibility service permissions and disguises its presence using generic system application icons.

Geographic Distribution and Target Demographics

While the complete geographic distribution remains under investigation, initial telemetry data suggests concentrated infection rates in regions with high mobile banking adoption.

The application’s multilingual interface—supporting English, Spanish, German, and French—indicates a broad targeting strategy aimed at global users.

Google removed the application from the Play Store within 48 hours of ThreatLabz’s disclosure.

However, the prolonged presence of the malicious app (estimated at 8 weeks before detection) raises concerns about gaps in automated screening processes.

Google has initiated a mass uninstallation campaign for affected devices, though manual removal remains necessary for users who disabled automatic updates.

Security professionals advise affected users to:

  1. Perform factory resets to eliminate residual malware components
  2. Monitor financial accounts for unauthorized transactions
  3. Enable Google Play Protect with real-time scanning
  4. Avoid granting accessibility permissions to unfamiliar applications

Organizations should consider implementing mobile threat defense solutions capable of detecting overlay attacks and anomalous network traffic patterns.

Ongoing investigations aim to identify the threat actors behind this campaign, with preliminary evidence suggesting ties to Eastern European cybercrime syndicates.

As mobile banking continues to expand, such attacks highlight the critical importance of user education and multi-layered security approaches in mitigating financial cyberthreats.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...