<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Android banking trojan &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/android-banking-trojan/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Thu, 30 Oct 2025 05:32:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Android banking trojan &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Herodotus mimics humans to bypass biometrics</title>
		<link>https://firsthackersnews.com/herodotus/</link>
					<comments>https://firsthackersnews.com/herodotus/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 29 Oct 2025 05:35:34 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Android banking trojan]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Herodotus]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10560</guid>

					<description><![CDATA[<p>A sophisticated Android banking trojan called Herodotus has appeared, using new techniques to evade detection. All about the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/herodotus/">Herodotus mimics humans to bypass biometrics</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A sophisticated Android banking trojan called Herodotus has appeared, using new techniques to evade detection. </p>



<h2 class="wp-block-heading"><strong>All about the malware-Herodotus</strong></h2>



<p>Found alongside Hook and Octo during routine monitoring, the samples more closely resemble Brokewell but include original code for advanced evasion. Active campaigns target users in Italy and Brazil, and the malware is being sold as Malware-as-a-Service by a threat actor named K1R0.</p>



<p>ThreatFabric found Herodotus follows modern banking-trojan trends but adds human-like remote-control input to evade behavioral biometric detection.</p>



<p>Herodotus begins with side-loading often delivered through SMiShing links that lure victims to malicious downloads. A custom dropper circumvents Android 13+ Accessibility Service restrictions by auto-installing the payload, opening the Accessibility settings and displaying a convincing loading overlay that hides the prompts used to grant powerful permissions. </p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="576" src="https://firsthackersnews.com/wp-content/uploads/2025/10/image-1024x576.png" alt="" class="wp-image-10561" srcset="https://firsthackersnews.com/wp-content/uploads/2025/10/image-200x113.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-300x169.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-400x225.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-600x338.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-768x432.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-800x450.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-1024x576.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-1200x675.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-1536x864.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Source – Threat Fabric</em></figcaption></figure>



<p>After activation the trojan fingerprints the device by collecting the installed apps and sends that inventory to its command-and-control server, which returns a tailored list of high-value targets and overlay URLs. </p>



<p>The malware then injects realistic-looking fake login screens over legitimate banking apps and intercepts incoming SMS messages so it can harvest credentials and one-time codes in real time.</p>



<p>Where Herodotus stands out is in how it performs input during remote takeover. Instead of pasting whole strings via ACTION_SET_TEXT or the clipboard, which creates instant, machine-like input patterns, it breaks operator-supplied text into single characters and inserts them at randomized intervals. </p>



<p>This per-character, delayed typing produces timing and rhythm very similar to human typing, reducing anomaly signals and making behavioral anti-fraud systems less likely to flag the session as automated.</p>



<p>Herodotus inserts 300–3000 ms delays between keystrokes to mimic human typing and try to fool basic behavioral detectors, though advanced profiling systems can still spot anomalies. Operators enable it with a &#8220;Delayed text&#8221; checkbox in the control panel.</p>



<h3 class="wp-block-heading" id="indicators_of_compromise"><strong>Indicators of Compromise</strong></h3>



<h4 class="wp-block-heading"><strong>Sample</strong></h4>



<figure class="wp-block-table"><table><tbody><tr><td><strong>SHA-256</strong></td><td><strong>Package name</strong></td><td><strong>Application name</strong></td><td><strong>C2</strong></td></tr><tr><td>&nbsp;53ee40353e17d069b7b7783529edda968ad9ae25a0777f6a644b99551b412083&nbsp;</td><td>&nbsp;com.cd3.app&nbsp;</td><td>Chrome</td><td>gj23j4jg[.]google-firebase[.]digital</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/herodotus/">Herodotus mimics humans to bypass biometrics</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/herodotus/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PixPirate, an Android banking malware</title>
		<link>https://firsthackersnews.com/pixpirate-malware/</link>
					<comments>https://firsthackersnews.com/pixpirate-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 16:43:25 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Android banking trojan]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[PixPirate]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[sensitive data]]></category>
		<category><![CDATA[steals data]]></category>
		<category><![CDATA[Stealthy malware]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7542</guid>

					<description><![CDATA[<p>PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers have unveiled its</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pixpirate-malware/">PixPirate, an Android banking malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers have unveiled its sophisticated methods, posing significant threats to financial institutions, especially in Brazil.</p>



<h2 class="wp-block-heading"><strong>What is PixPirate?</strong></h2>



<p>PixPirate is a type of Android banking malware designed to steal sensitive financial information from users. It typically targets Android devices and employs various techniques to evade detection, allowing it to operate stealthily on infected devices. PixPirate is known for its sophisticated methods and poses a significant threat to financial institutions, particularly in regions like Brazil.</p>



<p>In the past, banking malware typically concealed itself by removing its launcher icon using the SetComponentEnabledSetting API. </p>



<p>However, Android 10&#8217;s security enhancements made this method ineffective. PixPirate has devised a new tactic to overcome these obstacles, allowing it to vanish from the victim&#8217;s view during both reconnaissance and attack phases. As reported by Security intelligence, PixPirate, originating from Brazil, currently remains undetectable by most antivirus software.</p>



<p>PixPirate exploits the accessibility service to acquire remote access trojan (RAT) capabilities, enabling it to monitor user activities and pilfer sensitive information like online banking credentials and credit card details. </p>



<p>Additionally, it can tamper with SMS messages to circumvent two-factor authentication (2FA) measures.</p>



<p><strong>Key features of PixPirate include:</strong></p>



<ul class="wp-block-list"><li>Application manipulation and control</li><li>Keylogging</li><li>App inventory collection</li><li>App installation and removal</li><li>Device screen locking and unlocking</li><li>Access to phone accounts and contact lists</li><li>Device location tracking</li><li>Anti-VM and anti-debug features</li><li>Persistence after reboot</li><li>Spreading via WhatsApp</li><li>SMS message manipulation</li><li>Disabling Google Play Protect</li></ul>



<p>With these capabilities, PixPirate can engage in on-device fraud (ODF), carrying out transactions from the victim’s device to evade detection by bank security systems. </p>



<p>Recently, cybersecurity professional Shah Sheikh tweeted about PixPirate, highlighting its characteristics as a Brazilian financial malware crafted to evade detection on the victim’s system.</p>



<h2 class="wp-block-heading"><strong>The Infection Flow of PixPirate</strong></h2>



<p>Unlike typical financial malware that relies on a single Android Package (APK), PixPirate comprises two components. The downloader app isn&#8217;t just a conduit for installing the droppee; it actively participates in executing the malware, maintaining communication, and sending commands.</p>



<p> Victims are typically infected through malicious links sent via WhatsApp or SMS phishing messages. The downloader disguises itself as a legitimate banking app, deceiving victims into installing an &#8220;update&#8221; that is, in fact, the PixPirate malware.</p>



<p>PixPirate&#8217;s droppee app lacks a primary activity, making it devoid of a launcher icon and invisible on the home screen. The downloader app initiates the droppee, which would otherwise remain dormant. This technique guarantees the malware&#8217;s persistence even if the victim removes the downloader.</p>



<p>It targets the Brazilian instant payment platform Pix, redirecting funds to fraudsters&#8217; accounts by manipulating transactions. </p>



<p>The malware captures login credentials when the user opens a banking app and executes unauthorized transfers.</p>



<p>Users and financial institutions must stay vigilant and informed about such malware to safeguard against these evolving threats.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pixpirate-malware/">PixPirate, an Android banking malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/pixpirate-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SpyNote: Android spyware records your calls</title>
		<link>https://firsthackersnews.com/spynote-android-spyware/</link>
					<comments>https://firsthackersnews.com/spynote-android-spyware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 18 Oct 2023 00:46:01 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Android banking trojan]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Evilproxy]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[malicious link]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[spynote]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7048</guid>

					<description><![CDATA[<p>Security researchers conducted an analysis of the Android trojan called SpyNote, revealing numerous spyware capabilities associated with it.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/spynote-android-spyware/">SpyNote: Android spyware records your calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers conducted an analysis of the Android trojan called SpyNote, revealing numerous spyware capabilities associated with it.</p>



<h2 class="wp-block-heading"><strong>SpyNote: Android spyware</strong></h2>



<p>F-Secure reports that the trojan in question is typically disseminated through SMS phishing campaigns, which entice users to unknowingly download spyware onto their devices by clicking a malicious link embedded within the message.</p>



<p>SpyNote gains access to call logs, camera, SMS messages, and external storage while concealing its presence from both the primary Android screen and the Recents screen, effectively making detection challenging.</p>



<p>&#8220;The SpyNote malware app, as noted by F-Secure researcher Amit Tambe, can be initiated through an external trigger. Subsequently, it initiates its core malicious activities. Most notably, it actively seeks accessibility permissions, aiming to acquire additional privileges, including audio and telephone call recording permissions, keystroke logging capabilities, and the ability to capture screenshots of the phone through the MediaProjection API.&#8221;</p>



<p>A detailed examination of the malware by F-Secure uncovered the existence of so-called &#8220;diehard services,&#8221; which create complications when attempting to terminate the spyware, whether it&#8217;s the victims or the operating system itself trying to do so.</p>



<p>&#8220;The SpyNote sample is spyware that captures and pilfers a range of information, encompassing keystrokes, call logs, data regarding installed applications, and more,&#8221; Tambe explained. &#8220;It lurks discreetly on the victim&#8217;s device, evading easy detection and rendering the uninstallation process exceptionally challenging.&#8221;</p>



<p>The victim will be forced to do&nbsp;<strong>restore factory settings</strong>, thus losing all its other data.</p>



<p>Spyware presents multiple hazards, and it is imperative to comprehend its implications and implement protective measures. Among the foremost concerns linked to spyware are the invasion of privacy and the risk of data breaches.</p>



<p>Spyware poses a significant threat to our privacy as it stealthily infiltrates our devices, potentially harvesting critical personal and financial data that can subsequently be exploited for further malicious activities.</p>



<p>Beyond the privacy concerns, spyware can result in more extensive data breaches, encompassing personal and financial information, confidential corporate data, and other sensitive content. When this data is exposed, it can trigger substantial financial losses, disrupt trust and transparency, and potentially jeopardize national security.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/spynote-android-spyware/">SpyNote: Android spyware records your calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/spynote-android-spyware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zanubis: The Android banking trojan gets even more dangerous</title>
		<link>https://firsthackersnews.com/zanubis-android-banking-trojan/</link>
					<comments>https://firsthackersnews.com/zanubis-android-banking-trojan/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 29 Sep 2023 16:09:01 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Android banking trojan]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android malware]]></category>
		<category><![CDATA[android security]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[Zanubis]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=6987</guid>

					<description><![CDATA[<p>The Android banking Trojan Zanubis has adopted a new disguise, posing as the official application of the Peruvian</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zanubis-android-banking-trojan/">Zanubis: The Android banking trojan gets even more dangerous</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Android banking Trojan Zanubis has adopted a new disguise, posing as the official application of the Peruvian government organization SUNAT (Superintendencia Nacional de Aduanas y de Administración Tributaria), thereby tricking unsuspecting users.</p>



<h2 class="wp-block-heading"><strong>Zanubis: The Android banking trojan</strong></h2>



<p>Discovered initially in August 2022, this malware focuses on Peruvian bank users and cryptocurrency holders, disguising itself as authentic Android applications. Zanubis manipulates users into granting Accessibility privileges, effectively relinquishing control of their devices.</p>



<p>What distinguishes Zanubis is its growing sophistication, as detailed in a recent Kaspersky report. This Trojan employs the Obfuscapk Obfuscator for Android APK archives, rendering it challenging to identify.</p>



<p>Upon infiltrating the victim&#8217;s device, it loads a genuine SUNAT website through WebView, effectively creating a facade of legitimacy. The Trojan establishes continuous communication with its controlling server via WebSockets and a library known as Socket.IO, ensuring connectivity even in challenging circumstances.</p>



<p>A concerning aspect of the Zanubis banking trojan is its adaptability. It can be remotely reconfigured to steal data from specific applications and establish a secondary connection, granting full control over compromised devices. It can also mimic an Android update, potentially disabling the device.</p>



<p>In the same report, Kaspersky researchers highlight additional threats alongside Zanubis. Among these is AsymCrypt, a cryptor/loader specifically engineered to target cryptocurrency wallets.</p>



<p>Furthermore, researchers discussed Lumma stealer, formerly known as Arkei, which retains 46% of its original features. It disguises itself as a .docx to .pdf file converter and activates its payload when the files return with a double .pdf.exe extension. Lumma primarily focuses on crypto wallets, pilfering cached files, configuration files, and log files.</p>



<p>Tatyana Shishkova, Chief Security Researcher at Kaspersky&#8217;s GReAT, stressed the need for continuous vigilance and staying informed about ever-evolving threats.</p>



<p>&#8220;The dynamic nature of these threats, exemplified by Lumma and the Zanubis banking trojan, highlights the ever-evolving malware landscape,&#8221; he noted.</p>



<p>&#8220;Expert reports are crucial for staying informed about the latest malicious tools and attacker techniques, empowering us to maintain an edge in the continuous struggle for digital security.&#8221;</p>



<p>To mitigate financially motivated threats, Kaspersky suggests implementing preventive measures such as offline backups, utilizing ransomware protection tools, and adopting dedicated security solutions.</p>



<p>In the modern age, malware stands out as a prominent digital security threat, targeting devices with the intent to pilfer personal information or carry out unauthorized malicious activities.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zanubis-android-banking-trojan/">Zanubis: The Android banking trojan gets even more dangerous</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zanubis-android-banking-trojan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
