ThreatFabric researchers monitoring the activity of this virus found that the attackers were using the official Google Play Store for Android apps to spread their malware.

More than 30,000 Anatsa installations are reportedly registered through this platform in the last few months alone.

The last Anatsa campaign, which took place in 2021, infected more than 300,000 devices masquerading as PDF scanners, QR code scanners, Adobe Illustrator and other software.

Infected apps have been known to download malware after being installed on a device, and then start collecting the victim’s financial information, such as bank account information and credit card information.

Source: Ferra

Previous articleWhy and for whom: Microsoft has added a photo display function to the Edge browserComputers06:55 | 27 June 2023
Next articleFolding Google Pixel Fold breaks down just four days after unboxingPhones07:13 | 27 June 2023
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here