New Android Malware Herodotus Mimics Human Behaviour to Evad... #1533
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What it is: Herodotus is a new Android banking Trojan (Malware-as-a-Service by actor “K1R0”) focused on Device Takeover and credential theft. It blends Brokewell components with original code and introduces a notable anti-detection technique: human-like, per-character text entry with randomized delays.
Infection chain: Distributed via sideloading, typically after SMiShing to a malicious link hosting a dedicated dropper (written by the same develope...
🔧 Technical Details
Accessibility-driven device takeover: Abuse Android Accessibility to enumerate UI nodes (
HVNCA11Y), click by selector (CLICKELEMENT,CLICKTXT,CLICKDESC,CLICKHINT) or coordinates (TAP/SWIPE), and execute global actions (Back/Home/Recents). For reliable data entry, inject values directly into target nodes viaACTION_SET_TEXT(sendText1) or clipboard paste (sendText2) to avoid keyboard errors and ensure exact placement.Human-like text cadence to evade behavior biometrics: Split the payload string into characters and inject each as a discrete event with a randomized 300–3000 ms delay, simulating keystroke rhythm. This degrades simple automation detectors reliant on input speed alone and is toggled by an operator option (e.g., “Delayed text”) in the control panel.
Blocking overlays to conceal f...
🤖 Agent Actions
I analyzed the ThreatFabric post on Herodotus and explored the repository to find the best place to incorporate its technical techniques. The ideal location was indeed the existing page:
I read multiple relevant files to ensure there wasn’t already overlapping coverage and to match HackTricks style/structure:
What was missing and added:
Repository change:
No additional files were created or modified. The update keeps the content concise, highly technical, and consistent with HackTricks’ structure and style.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).