Skip to main content
Mallory

Android Banking Trojans Spread via Fake Document Reader and KYC Apps

financial-sector-threatcredential-stealer-activityloader-delivery-mechanismphishing-campaign-intelligencecommand-and-control-method
Updated April 29, 2026 at 04:04 AM3 sources
Share:
Android Banking Trojans Spread via Fake Document Reader and KYC Apps

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Researchers reported two Android banking malware campaigns using staged droppers to evade detection and steal financial data from mobile users. Zscaler ThreatLabz said a fake Document Reader app on Google Play was downloaded more than 10,000 times before removal and later fetched the Anatsa payload from a remote server, while CYFIRMA identified KYCShadow being distributed through fake KYC verification apps sent over WhatsApp to bank customers in India. In both cases, the initial apps appeared legitimate, then installed secondary malicious components designed to bypass early screening and analysis.

Once deployed, the malware sought high-risk permissions to hijack accounts, intercept SMS-based one-time passwords, and overlay banking apps to capture credentials. Anatsa was reported to target more than 831 financial institutions globally, including banks and cryptocurrency platforms, using obfuscation and anti-analysis techniques, while KYCShadow collected data such as mobile numbers, Aadhaar details, ATM PINs, and card information, then used Firebase Cloud Messaging and a full-tunnel VPN for command-and-control and traffic redirection. Researchers urged users to uninstall suspicious apps and avoid software delivered through messaging platforms, and advised defenders to monitor indicators including jsonapi[.]biz, jsonserv[.]biz, and jsonserv[.]xyz.

Timeline

  1. Apr 28, 2026

    Google removes malicious document reader app from Google Play

    After researchers reported the threat, Google removed the fake document reader app from the Play Store. Zscaler ThreatLabz also published indicators of compromise including hashes, infrastructure details, and the malicious package name to help defenders identify infections.

  2. Apr 28, 2026

    Fake document reader on Google Play infects 10,000+ devices with Anatsa

    A malicious document reader app on Google Play was downloaded more than 10,000 times and used a two-stage dropper to install the Anatsa Android banking trojan after passing initial review. Once deployed, Anatsa sought high-risk permissions to steal banking credentials, intercept SMS messages, and present fraudulent overlays targeting hundreds of financial institutions.

  3. Apr 1, 2026

    KYCShadow campaign targets Indian bank customers via fake KYC apps

    In April 2026, researchers identified an Android banking malware campaign tracked as KYCShadow that distributed fake KYC verification apps through WhatsApp to target bank customers in India. The malware harvested personal and banking data, intercepted OTPs, and used Firebase messaging plus a VPN-based channel for command-and-control and traffic routing.

  4. Jun 13, 2025

    CYFIRMA publishes KYCShadow banking malware research

    CYFIRMA published research on KYCShadow, an Android banking malware operation that abuses fake KYC verification apps to steal credentials and OTPs from bank customers in India. The report described its WhatsApp-based delivery, two-stage infection chain, and attacker infrastructure.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Android Banking Trojans and Financial Malware Targeting User Data and Payments

Android Banking Trojans and Financial Malware Targeting User Data and Payments

Multiple new Android malware campaigns have been identified targeting users' financial data and payment methods. Researchers uncovered advanced banking trojans such as BankBot-YNRK and DeliveryRAT, which harvest sensitive information from compromised devices and employ sophisticated evasion techniques, including emulator detection and device-specific targeting. These trojans often masquerade as legitimate apps, such as Indonesia's digital ID application, and can mute device notifications to avoid detection by victims. In addition, a next-generation Android banking trojan has been observed hiding within digital ID apps, automating the theft of cryptocurrency wallets and evading analysis environments. A separate large-scale scam involves over 760 malicious Android apps exploiting NFC and HCE technologies to steal payment card data globally. These apps facilitate unauthorized transactions by leveraging contactless payment features. The surge in Android-targeted financial malware highlights the growing risk to users' banking credentials, payment cards, and cryptocurrency assets, with attackers employing increasingly sophisticated methods to bypass security controls and evade user awareness.

1 months ago
Four Android Banking Trojans Target 800+ Apps With MFA-Bypassing Overlays

Four Android Banking Trojans Target 800+ Apps With MFA-Bypassing Overlays

Zimperium zLabs identified four Android malware families—**RecruitRat, SaferRat, Astrinox, and Massiv**—in active campaigns targeting users of more than **800 banking, cryptocurrency, and social media apps**. The malware is being spread through phishing sites, smishing messages, fake job application and streaming lures, counterfeit app-store pages, and bogus updates that trick victims into installing malicious APKs. Researchers said the campaigns rely heavily on overlay attacks, with fake login screens placed over legitimate apps to steal credentials; **RecruitRat** alone reportedly includes more than **700** fraudulent login pages. Once installed, the trojans abuse Android features including **Accessibility Services**, the **Session Installation API**, **MediaProjection**, overlays, and **WebView** to gain persistence, intercept SMS and one-time passwords, log keystrokes, enumerate apps, steal contacts, freeze screens, stream displays, and remotely control infected devices. The malware also uses anti-analysis techniques such as APK tampering, encrypted strings, reflection, dynamic DEX loading, and environment-aware execution, while command-and-control traffic is sent over HTTPS or WebSockets, with RecruitRat additionally using **RC4** encryption. Researchers warned the activity creates enterprise risk because infected employee devices can enable account takeover, bypass MFA, and expose corporate resources.

1 weeks ago
Android Banking Trojan Masquerades as News and ID Apps to Steal Credentials and Crypto

Android Banking Trojan Masquerades as News and ID Apps to Steal Credentials and Crypto

A sophisticated Android banking Trojan, identified as Android/BankBot-YNRK, has been discovered targeting users primarily in Indonesia and potentially other Southeast Asian countries. The malware disguises itself as legitimate applications, including news readers and digital ID apps such as "Identitas Kependudukan Digital," to trick users into installation. Once installed, it leverages Android's accessibility features and device administrator privileges to gain extensive control over the device, allowing it to read on-screen content, simulate user actions, and overlay fake login screens on top of real banking and cryptocurrency apps to harvest credentials. The Trojan employs advanced evasion techniques, such as checking for emulators to avoid detection, obfuscating its code, and muting device notifications to operate stealthily. It connects to a remote command-and-control server to exfiltrate sensitive data, including banking credentials and cryptocurrency wallet keys, and can receive further instructions to update itself or erase traces. The malware's primary objective is financial theft, enabling attackers to drain victims' bank accounts and crypto wallets without their knowledge. Security researchers note that the malware's abuse of accessibility permissions is mitigated in Android 14, which requires explicit user approval for such access, but devices running Android 13 and earlier remain vulnerable.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.