Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware

By Published On: December 9, 2025

The digital landscape is a minefield, and even the most trusted platforms can harbor insidious threats. A recent discovery by Zscaler ThreatLabz has unveiled a disturbing campaign targeting Android users through the Google Play Store, where a seemingly innocuous document reader app was found distributing the potent Anatsa banking trojan. This isn’t just about a single malicious app; it highlights the persistent challenge of mobile security and the sophisticated tactics employed by cybercriminals to bypass conventional defenses.

The Deceptive Lure: “Document Reader – File Manager”

Cybersecurity firm Zscaler ThreatLabz identified an application, deceptively named “Document Reader – File Manager,” which originated from the developer ISTOQMAH. This app, despite its malicious payload, had managed to accumulate over 50,000 downloads before its true nature was exposed. Its longevity on the Google Play Store, a platform typically associated with rigorous security checks, underscores the cleverness of its design and the difficulty in detecting advanced threats.

Anatsa: A Banking Trojan with a Vicious Bite

The core threat delivered by this fraudulent app is the Anatsa banking trojan. Anatsa is a sophisticated piece of malware notorious for its ability to steal sensitive financial information. Once installed, it employs a range of techniques to compromise user accounts, including:

  • Overlay Attacks: Anatsa creates fake login screens that perfectly mimic legitimate banking applications. Users, unaware of the deception, enter their credentials, which are then harvested by the attackers.
  • Keylogging: The trojan can record keystrokes, capturing passwords, PINs, and other confidential data as users type.
  • SMS Interception: Anatsa often intercepts SMS messages, particularly those containing one-time passwords (OTPs) or transaction verification codes, bypassing multi-factor authentication measures.
  • Remote Access: In some variants, Anatsa can gain remote control over a compromised device, allowing attackers to directly manipulate banking apps or initiate transactions.

The sheer number of downloads and the malicious payload of Anatsa underscore the significant risk posed to individuals who installed this app, potentially exposing their financial assets and personal data to theft.

How Malicious Apps Bypass Google Play Protections

The presence of “Document Reader – File Manager” on the Google Play Store for an extended period, despite its malicious intent, raises important questions about platform security. Attackers often employ several techniques to evade detection:

  • Delayed Malice: The app might initially be benign, and the malicious payload is delivered later through updates or remote command and control servers, after the app has gained user trust and sufficient downloads.
  • Obfuscation: Malicious code is heavily obfuscated to make static analysis difficult for automated scanning tools.
  • Dynamic Loading: Key malicious components might be downloaded dynamically after installation, preventing their detection during the initial app review process.
  • Social Engineering: The app itself is often designed to appear legitimate and useful, enticing users to grant necessary permissions without suspicion.

Remediation Actions for Android Users

For individuals who may have downloaded “Document Reader – File Manager” or any other suspicious app, immediate action is crucial. Here are recommended remediation steps:

  • Uninstall Immediately: Locate and uninstall the “Document Reader – File Manager” app. Be wary of any other apps from the developer ISTOQMAH.
  • Scan with a Reputable Antivirus: Run a full scan of your Android device using a trusted mobile antivirus solution from vendors like Bitdefender, Kaspersky, or Malwarebytes.
  • Change Financial Passwords: Immediately change passwords for all banking applications, financial services, and any other sensitive accounts accessed from the compromised device. Consider enabling stronger multi-factor authentication (MFA) methods, such as hardware tokens or authenticator apps, where available.
  • Monitor Bank Statements: Closely monitor all bank accounts, credit card statements, and other financial transactions for any unauthorized activity. Report suspicious transactions to your bank immediately.
  • Revoke Permissions: Review the permissions granted to all installed applications. Restrict unnecessary permissions, especially for apps that request access to SMS, accessibility services, or contacts without a clear justification.
  • Update Operating System: Ensure your Android operating system and all installed apps are updated to the latest versions to patch known vulnerabilities. For an example of critical Android vulnerabilities, refer to CVE-2023-28564.

Recommended Tools for Mobile Security

Maintaining strong mobile security requires vigilance and the use of appropriate tools. Here’s a table of useful resources:

Tool Name Purpose Link
Bitdefender Mobile Security Comprehensive mobile security, including antivirus, anti-phishing, and app locker. Bitdefender
Malwarebytes Security for Android Detects and removes malware, ransomware, and other threats; privacy audit. Malwarebytes
Google Play Protect Built-in Android security for app scanning, although not infallible as seen with Anatsa. Google Play Protect
Authy / Google Authenticator Two-factor authentication (2FA) for enhanced account security. Authy / Google Authenticator

Key Takeaways for Digital Safety

The discovery of the Anatsa banking trojan disguised as a document reader app on Google Play serves as a stark reminder of the sophisticated and persistent threats targeting mobile users. It emphasizes the need for continuous vigilance, skepticism towards new applications, even those on official app stores, and robust security practices. Always verify the legitimacy of unknown developers, scrutinize requested permissions, and prioritize the implementation of strong cybersecurity measures to protect your digital and financial well-being.

Share this article

Leave A Comment