Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Hackers Hit 831 Banks and Financial Institutions Worldwide As Dangerous Malware Deployed in Dozens of Android Apps: Security Firm

Hackers Hit 831 Banks and Financial Institutions Worldwide As Dangerous Malware Deployed in Dozens of Android Apps: Security Firm

Daily HodlDaily Hodl2025/08/29 16:00
By:by Henry Kanapi

Security researchers say a mobile banking trojan first spotted in 2020 is now targeting financial institutions across the globe.

In a new report, the cloud-native cybersecurity platform Zscaler says hackers are aggressively expanding the scope and streamlining payload of the Android banking trojan Anatsa.

Anatsa came to life five years ago after a slew of attacks that targeted financial app users and over 650 financial institutions in the US, Europe and the UK. The malware is capable of hijacking credentials, monitoring keystrokes and facilitating fraudulent transactions.

The cybersecurity firm says that the malware is now masquerading as a document reader in the Google Play Store to deliver its malicious payload.

“Once installed, Anatsa silently downloads a malicious payload disguised as an update from its command-and-control (C2) server. This approach allows Anatsa to bypass Google Play Store detection mechanisms and successfully infect devices.”

Zscaler says the malware steals credentials by displaying fake banking login pages, tailored to the financial apps detected on a user’s device.

Through this process, the firm says Anatsa was able to increase its target to 831 financial institutions worldwide, including 150 new banking and cryptocurrency platforms. The malware has also been linked to 77 malicious apps with over 19 million installs.

“Anatsa continues to evolve and improve with anti-analysis techniques to better evade detection… Our research demonstrates the techniques that Anatsa and other Android malware families leverage for distribution through the official Google Play Store.

Android users should always verify the permissions that applications request, and ensure that they align with the intended functionality of the application.”

Generated Image: Midjourney

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!