Although the Google Play Store offers hundreds of thousands of apps that make our lives easier, malicious ones are unfortunately not absent. Recently, apps attempting to steal users’ banking data have been detected.
Android apps that steal banking data!
According to software company ThreatFabric, these apps contain a Trojan horse called “Anatsa.” This virus targets around 600 major finance apps in countries like the United States, the United Kingdom, Germany, and others, aiming to steal users’ banking data.
According to the source, this virus attempts to steal the user’s identity, credit card information, balance, and payment details from the banking app, as well as gain control over the device to perform various actions, such as sending money to another account on behalf of the user. Since these actions are performed from the user’s own device, it is difficult to detect the fraudulent activity until the user realizes it.
According to the software company, the apps containing this Trojan horse are disguised as legitimate apps on the Play Store, aiming to genuinely simplify tasks for users. Once installed on the device, they download external software, which is, predictably, the virus itself.
Here are the names of the Android apps containing the Anatsa Trojan horse that steal users’ banking data:
App Name | App ID |
---|---|
PDF Reader – Edit & View PDF | lsstudio.pdfreader.powerfultool.allinonepdf.goodpdftools |
PDF Reader & Editor | com.proderstarler.pdfsignature |
PDF Reader & Editor | moh.filemanagerrespdf |
All Document Reader & Editor | com.mikijaki.documents.pdfreader.xlsx.csv.ppt.docs |
All Document Reader and Viewer | com.muchlensoka.pdfcreator |
A Google spokesperson stated that the mentioned malicious apps have been removed from the Play Store, and the developers have been banned. They also mentioned that Google Play Protect automatically removes these apps from Android devices. However, there are users who claim that the apps have not been removed.
What are your thoughts on this matter? Share your opinions in the Comments section below.
{{user}} {{datetime}}
{{text}}