{"id":306512,"date":"2025-12-09T07:26:08","date_gmt":"2025-12-09T07:26:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/uk\/306512\/"},"modified":"2025-12-09T07:26:08","modified_gmt":"2025-12-09T07:26:08","slug":"malicious-document-reader-app-in-google-play-with-50k-downloads-installs-anatsa-malware","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/uk\/306512\/","title":{"rendered":"Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware"},"content":{"rendered":"<p>            <a href=\"https:\/\/i1.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMG4YDfJRHPhUCmPN96g8LnnNRXa87DurNKqXo0qtC-b4dQPeNUZh6iUpShXKfk2xYW0qDg3FyVuGIIzvN0XNxv_K3wrhN18Bdm_Ww5rl0OW30U3KSnnoasklYZmhr7OsVOvICheePhS_HNfgDtdIb_9HUiuhyphenhyphen55mYj9bU1vfdtgHc91gRndW2AcTI4YrD\/s16000\/Malicious%20Document%20Reader%20App%20Google%20Play.webp?w=1600&amp;resize=1600,900&amp;ssl=1\" data-caption=\"\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" post-id=\"135545\" fifu-featured=\"1\" width=\"696\" height=\"\" class=\"entry-thumb td-modal-image\" src=\"https:\/\/www.newsbeep.com\/uk\/wp-content\/uploads\/2025\/12\/Malicious Document Reader App Google Play.webp\" alt=\"Malicious Document Reader App Google Play\" title=\"Malicious Document Reader App Google Play\"\/><\/a><\/p>\n<p>A deceptive Android application lurking in the Google Play Store, disguised as a document reader and file manager, but delivering the Anatsa banking trojan to users. <\/p>\n<p>Cybersecurity firm Zscaler ThreatLabz found an app named \u201cDocument Reader \u2013 File Manager\u201d by developer ISTOQMAH. The app has amassed over 50,000 downloads while remaining live, tricking users into granting permissions that enable financial <a href=\"https:\/\/cybersecuritynews.com\/tag\/data-theft\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">data theft<\/a>.<\/p>\n<p>This campaign highlights ongoing challenges in securing official app stores against sophisticated malware droppers.\u200b<\/p>\n<p>Anatsa, also known as TeaBot, emerged in 2020 as an Android banking malware specializing in credential theft, keylogging, and fraudulent transactions targeting financial apps.<\/p>\n<p>Recent variants have expanded to over 831 institutions worldwide, including new regions like Germany and South Korea, plus cryptocurrency platforms.<\/p>\n<p>The Trojan employs advanced evasion tactics, such as runtime DES decryption of strings, device model checks to dodge emulators, and malformed ZIP archives hiding DEX payloads that evade static analysis tools.\u200b<\/p>\n<p><a href=\"https:\/\/www.google.com\/preferences\/source?q=cybersecuritynews.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">&#13;<br \/>\n<img decoding=\"async\" src=\"https:\/\/thecybernews.com\/csngoogle.svg&#13;&#10;\" alt=\"google\"\/><\/a><\/p>\n<p>In this instance, the dropper app poses as a benign tool for opening PDFs, scanning documents, and managing files, complete with an intuitive interface.<\/p>\n<p>Upon installation, it silently fetches the Anatsa payload disguised as an update from a command-and-control server, bypassing Play Store protections. If checks fail, it displays a fake file manager to maintain cover.<\/p>\n<p>Once active, Anatsa seeks accessibility permissions to auto-grant dangerous privileges like SYSTEM_ALERT_WINDOW, READ_SMS, and full-screen intents, then overlays phishing pages tailored to detected banking apps.\u200b<\/p>\n<p>ThreatLabz detailed specific indicators for this Anatsa wave, aiding detection efforts. The app\u2019s Play Store page promotes it as an \u201call-in-one solution\u201d for documents, yet harbors malicious code.\u200b<\/p>\n<p lang=\"en\" dir=\"ltr\">\u26a0\ufe0fThreatLabz has identified another malicious Android app in the Google Play Store that is still currently live with over 50K downloads. The app is disguised as a document reader \/ file manager, but actually downloads the Anatsa trojan. The IOCs below can be used to identify this\u2026 <a href=\"https:\/\/t.co\/XlhXvgv5Ko\" rel=\"nofollow\">pic.twitter.com\/XlhXvgv5Ko<\/a><\/p>\n<p>\u2014 Zscaler ThreatLabz (@Threatlabz) <a href=\"https:\/\/twitter.com\/Threatlabz\/status\/1998072507883225180?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">December 8, 2025<\/a><\/p>\n<p>This app joins dozens of similar decoys, with ThreatLabz reporting 77 malicious apps totaling 19 million installs recently removed from Google Play. Anatsa campaigns frequently use productivity apps like document viewers, exploiting trust in utility tools.\u200b<\/p>\n<p>Users face risks of stolen banking credentials via fake logins or automated fraud, especially in North America, where prior strains ranked high in \u201cFree Tools\u201d sections. Google has bolstered Play Protect, but timely researcher reports remain crucial.<\/p>\n<p>Android owners should scrutinize app permissions, avoid unsolicited updates, and use <a href=\"https:\/\/cybersecuritynews.com\/scan-linux-servers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">antivirus scanners<\/a>. Security teams can leverage these IOCs for network monitoring and device forensics.\u200b<\/p>\n<p>Campaign Indicators<\/p>\n<p>IndicatorValuePackage Namecom.quantumrealm.nexdev.quarkfilerealm_filedoctool G7qS0W6bMAEE2v4.jpg\u200bInstaller MD598af36a2ef0b8f87076d1ff2f7dc9585Payload MD5da5e24b1a97faeacf7fb97dbb3a585afDownload URLhttps:\/\/quantumfilebreak[.]com\/txt.txtC2 Servershttp:\/\/185.215.113[.]108:85\/api\/<br \/>http:\/\/193.24.123[.]18:85\/api\/<br \/>http:\/\/162.252.173[.]37:85\/api\/ \u200b<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)\">Follow us on <a href=\"https:\/\/news.google.com\/publications\/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google News<\/a>, <a href=\"https:\/\/www.linkedin.com\/company\/cybersecurity-news\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, and <a href=\"https:\/\/x.com\/cyber_press_org\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">X<\/a> for daily cybersecurity updates. <a href=\"https:\/\/cybersecuritynews.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Contact us<\/a> to feature your stories.<\/p>\n<p><a href=\"https:\/\/news.google.com\/publications\/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">&#13;<br \/>\n<img decoding=\"async\" src=\"https:\/\/thecybernews.com\/gnews.svg&#13;&#10;\" alt=\"googlenews\"\/><\/a>        <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"A deceptive Android application lurking in the Google Play Store, disguised as a document reader and file manager,&hellip;\n","protected":false},"author":2,"featured_media":306513,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[2306,86,56,54,55],"class_list":{"0":"post-306512","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-mobile","9":"tag-technology","10":"tag-uk","11":"tag-united-kingdom","12":"tag-unitedkingdom"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/306512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/comments?post=306512"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/306512\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media\/306513"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media?parent=306512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/categories?post=306512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/tags?post=306512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}