Malicious Document Reader App With 50,000 Downloads on Google Play Installs Dangerous Anatsa Banking Malware

Google has since removed the app and banned the associated developer account, but the campaign underscores the persistence and evolution of banking malware hiding inside official app marketplaces.

Lakshmi
5 Min Read
Malicious Document Reader App With 50,000 Downloads on Google Play Installs Dangerous Anatsa Banking Malware

A seemingly harmless utility on the Google Play Store, titled Document Viewer – File Reader, has been found distributing the sophisticated Anatsa banking Trojan to Android users. Security firm ThreatFabric discovered that the app initially operated as a normal file viewer before receiving a delayed update containing malicious code. This staged approach helped the app bypass Google Play’s security screening and accumulate more than 50,000 installations, with some estimates suggesting the number climbed close to 90,000.

Google has since removed the app and banned the associated developer account, but the campaign underscores the persistence and evolution of banking malware hiding inside official app marketplaces.

Key Takeaways

  • Malicious App: Document Viewer – File Reader was used as a dropper for the Anatsa Trojan.
  • Scale of Impact: More than 50,000 confirmed downloads.
  • Malware: Anatsa (also known as TeaBot or Toddler) steals banking credentials and can execute fraudulent transactions.
  • Attack Method: The app behaved normally at first, then delivered malware disguised as a fake “PDF update.”
  • Target Region: Primarily banking customers in the United States and Canada.
  • Mitigation: Google removed the app and Play Protect now blocks known Anatsa variants.

The Threat Posed by Anatsa

Anatsa is one of the most advanced Android banking Trojans active today, operating since at least 2020. It is designed to infiltrate financial apps, harvest credentials, and automate unauthorized transactions.

The malware relies heavily on overlay attacks, where a fake login screen is displayed on top of a legitimate banking app. The user unknowingly enters sensitive information, which is immediately forwarded to attackers.

Once the malware gains access to Android Accessibility Services, it obtains near-complete control over the device, enabling:

  • Keylogging
  • Screen monitoring
  • Automatic transaction execution
  • Interception of multi-factor authentication prompts

ThreatFabric notes that Anatsa can initiate fraudulent transfers in real time without requiring the victim to perform any action beyond granting permissions.

How the Attack Unfolded

  1. Benign Initial Submission

The attacker uploaded a fully functional and harmless document viewer to the Google Play Store. It performed as advertised, drawing no suspicion and passing automated security checks.

  1. Rapid User Growth

The app climbed Play Store rankings, especially in the US Tools category, achieving over 50,000 downloads.

  1. Malicious Update Delivery

Approximately six weeks after publication, the developer pushed an update described as a PDF engine upgrade or text recognizer add-on. This was the actual dropper containing code to fetch and install the Anatsa payload.

  1. Device Takeover

Once downloaded, Anatsa requested access to Accessibility Services. Granting this permission gives the malware the capability to:

  • Capture banking credentials
  • Control the UI
  • Approve fraudulent transactions
  • Interact with other installed apps
  1. Evasion Measures

When victims attempted to open their banking apps, they were shown a fake Scheduled Maintenance screen to prevent them from noticing fraudulent activity or contacting their bank.

Protecting Yourself from Banking Trojans

  1. Check App Permissions
    Document reader apps should never need Accessibility Services or broad system control.
  2. Validate Developers
    Avoid apps from unknown or single-app developers with generic names.
  3. Review Recent Ratings
    Look for red flags such as sudden negative reviews, unexpected behavior, or permission complaints.
  4. Keep Play Protect On
    Google Play Protect scans apps before installation and periodically checks for harmful behavior.
  5. Avoid Side-loading
    Install apps only from reputable sources.

Q1: What is a banking Trojan?

A1: A banking Trojan is malicious software engineered to steal financial login data, payment card details, and account information. Attackers commonly use overlay screens, keylogging, and device control to compromise banking apps.

Q2: Why do hackers abuse Android Accessibility Services?

A2: Accessibility Services offer capabilities like reading screen content and interacting with other apps. Once granted, malware gains near-total device control, allowing credential theft and automated fraudulent transactions.

Q3: How does the dropper method work?

A3: Attackers publish a clean app to gain user trust and pass security checks. After the user base grows, an update delivers the real malicious payload. This delayed attack helps malware evade detection mechanisms such as Google Play Protect.

Share This Article
Lakshmi, with a BA in Mass Communication from Delhi University and over 8 years of experience, explores the societal impacts of tech. Her thought-provoking articles have been featured in major academic and popular media outlets. Her articles often explore the broader implications of tech advancements on society and culture.
Leave a Comment