7 min read
7 min read

A new wave of banking malware has been detected targeting mobile devices. The malware is designed to steal sensitive financial information from users without their knowledge.
The attack is spreading quickly through deceptive mobile apps. Cybersecurity teams are issuing warnings to check devices for signs of infection. Immediate action is recommended to prevent further damage.

Recent data shows that more than 50,000 Android users in the US and Canada were infected between June 24 and 30, many through a malicious update to a fake PDF viewer app on the Google Play Store.
Most victims were unaware of the breach until fraudulent transactions appeared. The malware operates silently in the background, making early detection difficult.
It has already stolen login credentials, banking PINs, and other personal details. Users across several regions have reported suspicious activity. This widespread attack highlights the urgent need for awareness.

Banking malware is a type of malicious software that specifically targets financial apps and services. It is designed to steal login information, intercept SMS codes, and monitor user behavior. Unlike other malware, it focuses solely on gaining access to users’ banking data.
In this case, the malware known as Anatsa or “TeaBot” has targeted major North American banks by mimicking their mobile apps. Once installed, it can record keystrokes and take screenshots. Users may not notice anything unusual until it is too late.

This malware targets mobile phones through fake apps, malicious links, and app permissions. In the recent campaign, it posed as “Document Manager – File Reader” on the US Google Play Store, amassing thousands of downloads before pushing a malicious update. After installation, it requests access to sensitive features like SMS, accessibility, and overlay.
With these permissions, it can intercept messages and bypass security measures. Many users unknowingly grant these permissions during setup. That is how the malware gains full control of the device.

Android devices are currently the primary target for this attack. The open nature of the Android ecosystem allows more flexibility for app installation. However, it also means that users are more vulnerable to third-party threats.
In this wave, Android users in the United States were most affected, with the malicious app briefly ranking in the Top 3 Free Tools on Google Play, before it was removed. Apple devices have also been targeted in rare cases, but Android remains the main concern.

Once installed, the malware begins harvesting sensitive user data. This includes banking usernames, passwords, two-factor authentication codes, and even biometric data. In some cases, it can record audio or track user movements.
This stolen information is sent to remote servers controlled by hackers. They can then access user accounts and transfer funds, especially targeting online banking platforms in the US and Canada. The longer the malware remains active, the more data it collects.

The malware is spreading by copying the look and feel of popular American banking and utility apps. Some fake apps closely resemble legitimate ones, with matching icons and interfaces. Users are often fooled into installing these look-alike apps.
Some of these are found on unofficial app stores, while others are shared via social media and text messages. Even careful users can be tricked if they are not paying close attention. This method of deception is highly effective.

One common tactic involves fake system or app updates. These fake prompts may appear convincing, asking users to improve performance or security. In this case, the malware was pushed via a malicious app update between June 24 and 30, after the app had already gained thousands of installs in the US.
Unlike legitimate updates, there is no verification process. This tactic bypasses normal app store protections. Users should be cautious when updates appear outside of official channels or are requested via unfamiliar apps.

Many infections remain unnoticed for days or even weeks. The malware runs quietly and does not affect basic phone functions. Users might only realize something is wrong after unauthorized bank transactions.
By then, personal data may already be compromised. Some versions even delete text messages from banks to hide suspicious activity. These tactics make it difficult for average users to recognize an active threat. Regular monitoring is essential.

Several warning signs can indicate malware activity. Unexpected pop-ups, high data usage, or battery drain are common symptoms. Users may also notice banking apps behaving strangely or crashing frequently.
If you receive texts about transactions you did not authorize, that is a clear red flag. Another sign is being asked to grant unusual permissions. Always question why an app needs access to certain features on your device.

To protect yourself, avoid installing apps from unknown sources. Only download from official app stores and verify developer details. Be cautious when granting permissions, especially those related to messages and accessibility.
Keep your banking credentials private and never share them via text or email. Regularly check your transaction history and report any suspicious activity. Use multi-factor authentication when available.

Make sure your device software is fully up to date. Operating system updates often include patches for known vulnerabilities. Delaying updates can leave your phone open to malware attacks. The recent Anatsa malware exploited outdated Android versions.
Also, update your apps regularly, especially banking and security tools. Keeping your phone current is one of the easiest ways to improve its defense.
Stick to Google Play Store or Apple App Store when downloading new apps. These platforms have security systems that scan for malware. Avoid third-party stores or links shared through texts and social media.
Even if an app looks familiar, double-check its name, developer, and reviews. If something feels off, do not install it. Being cautious during app installation can prevent infections entirely.

A reliable mobile security app can help detect and block malware. Look for apps from well-known cybersecurity companies with strong user ratings.
These tools scan your phone regularly for threats. Some can also warn you if an app is requesting suspicious permissions. Make sure to keep your security app updated. It acts as a frontline defense against malware and phishing attempts.

If you notice any signs of malware or unusual banking activity, act quickly. Contact your bank to freeze your accounts and change your credentials. Several users reporting fraudulent transactions in late June led to the discovery of the infected app.
Report the app or website to cybersecurity authorities on other platforms like Google or Apple. Remove suspicious apps immediately and run a full scan using a security tool. Prompt action can minimize damage and help protect others. Your report may help stop the spread.
Think you’re using AI safely? Discover how OpenAI blocks users for suspicious behavior.
Cyber threats are constantly evolving, so staying informed is crucial. Follow trusted sources for the latest cybersecurity updates. Take a few minutes each week to check your device’s settings and activity.
Educate friends and family about these risks so they can protect themselves, too. The more you know, the safer your online experience will be. Small steps today can prevent major losses tomorrow.
Is the internet about to change for kids? Explore how the Kids Online Safety Act could reshape the internet.
Did this slideshow help you understand how to protect your phone from banking malware threats? Share your thoughts.
Read More From This Brand:
Don’t forget to follow us for more exclusive content right here on MSN.
This slideshow was made with AI assistance and human editing.
This content is exclusive for our subscribers.
Get instant FREE access to ALL of our articles.
Dan Mitchell has been in the computer industry for more than 25 years, getting started with computers at age 7 on an Apple II.
We appreciate you taking the time to share your feedback about this page with us.
Whether it's praise for something good, or ideas to improve something that
isn't quite right, we're excited to hear from you.
Stay up to date on all the latest tech, computing and smarter living. 100% FREE
Unsubscribe at any time. We hate spam too, don't worry.

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!