Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

Posted on October 29, 2025October 29, 2025 By CWS

A complicated Android banking trojan named Herodotus has emerged on the cell risk panorama, introducing groundbreaking methods to evade detection techniques.

Throughout routine monitoring of malicious distribution channels, the Cellular Risk Intelligence service found unknown malicious samples distributed alongside infamous malware variants like Hook and Octo.

Regardless of sharing distribution infrastructure, these samples revealed nearer similarities to Brokewell, a malware household beforehand recognized by ThreatFabric analysts.

Nevertheless, Herodotus represents a definite risk combining Brokewell parts with authentic code designed for superior evasion.

Lively campaigns have been noticed focusing on customers in Italy and Brazil, with the malware supplied as Malware-as-a-Service by risk actor K1R0 on underground boards.

Underground discussion board selling Herodotus as Malware-as-a-Service (Supply – Risk Cloth)

ThreatFabric researchers recognized that Herodotus follows fashionable banking trojan tendencies whereas introducing a functionality distinguishing it from different machine takeover malware—mimicking human behaviour throughout distant management classes to bypass behavioural biometrics detection.

Main capabilities (Supply – Risk Cloth)

The malware operates by means of an an infection chain starting with side-loading, doubtlessly involving SMiShing campaigns main victims to malicious obtain hyperlinks.

As soon as deployed, Herodotus leverages a customized dropper designed to bypass Android 13+ restrictions on Accessibility Providers.

After set up, the dropper mechanically launches the payload and opens Accessibility Service settings, prompting victims to allow the service whereas displaying a misleading loading display screen overlay that conceals granting harmful permissions.

Following profitable deployment, Herodotus collects put in software lists and transmits this knowledge to its command-and-control server, which responds with focused software lists and corresponding overlay hyperlinks.

The trojan deploys faux credential-harvesting screens over professional banking purposes, capturing login credentials and two-factor authentication codes by means of SMS interception.

Humanising Fraudulent Transactions

What units Herodotus aside is its method to textual content enter automation throughout machine takeover assaults.

Conventional distant entry trojans set textual content instantly in enter fields utilizing the ACTION_SET_TEXT operate or clipboard manipulation, delivering full textual content strings instantaneously.

Nevertheless, this machine-like behaviour creates suspicious patterns that behavioural anti-fraud techniques detect as automated assault indicators.

Herodotus implements a novel approach the place operator-specified textual content is break up into particular person characters, with every character set individually at randomized intervals.

Randomization of delay between set textual content occasions (Supply – Risk Cloth)

The malware introduces delays starting from 300 to 3000 milliseconds between character enter occasions, replicating pure human typing patterns.

This randomization makes an attempt to evade rudimentary behavioural detection techniques measuring enter timing, although refined techniques modeling particular person behaviour establish anomalies.

The malware panel features a checkbox labeled “Delayed textual content” that operators toggle to allow human-like enter simulation.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Behaviour, Biometrics, Bypass, Detection, Herodotus, Human, Malware, Mimic

Post navigation

Previous Post: New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
Next Post: Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Related Posts

Hackers Expose All User Records from Popular Dark Web Forum Hackers Expose All User Records from Popular Dark Web Forum Cyber Security News
Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware Cyber Security News
UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports Cyber Security News
7 Best Security Awareness Training Platforms For MSPs in 2026 7 Best Security Awareness Training Platforms For MSPs in 2026 Cyber Security News
New NFC-Driven PhantomCard Android Malware Attacking Banking Users New NFC-Driven PhantomCard Android Malware Attacking Banking Users Cyber Security News
Metasploit Adds Exploit Module for Recently Disclosed FortiWeb 0-Day Vulnerabilities Metasploit Adds Exploit Module for Recently Disclosed FortiWeb 0-Day Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark