No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
Android OS |
Advisory ID: |
ngCERT-2024-0022 |
Version: |
N/A |
CVE: |
N/A |
Published: |
July 10, 2024 |
ngCERT has identified a new version of the Anatsa banking trojan that targets Android devices and steals banking credentials and financial information from users. The trojan masquerades as a PDF and QR code reader and uses advanced remote-control and evasion techniques to bypass security measures and display fake login screens. The trojan has been distributed through various apps on the Google Play Store and has infected over 70,000 devices. ngCERT urges Android users to exercise caution when downloading apps and to follow the recommendations below to protect their devices and accounts.
The Anatsa banking trojan is a sophisticated malware that leverages Android's accessibility services to gain full control over the infected device and to carry out fraudulent transactions. The trojan is delivered through malicious apps that appear to be legitimate PDF and QR code readers or cleaner apps. These apps initially behave normally until they secretly download, decrypt, and execute the trojan's payload, which bypasses the restricted settings for accessibility services, mostly in Android 13. The trojan then establishes a connection with its command and control (C2) server and waits for instructions from the attacker. The trojan is capable of stealing the user's banking credentials, credit card details, and payment information by overlaying fake login screens on top of legitimate banking apps and by recording keystrokes. The trojan can also prevent the user from interacting with certain apps that are defined by the attacker and can download, upload, delete, install, and find files on the device.
Successful installation of this malware on any android device will allow the attacker to:
ngCERT recommends the following actions to prevent or mitigate the infection by the Anatsa banking trojan: