Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

Posted on October 29, 2025October 29, 2025 By CWS

A complicated Android banking trojan named Herodotus has emerged on the cell risk panorama, introducing groundbreaking methods to evade detection techniques.

Throughout routine monitoring of malicious distribution channels, the Cellular Risk Intelligence service found unknown malicious samples distributed alongside infamous malware variants like Hook and Octo.

Regardless of sharing distribution infrastructure, these samples revealed nearer similarities to Brokewell, a malware household beforehand recognized by ThreatFabric analysts.

Nevertheless, Herodotus represents a definite risk combining Brokewell parts with authentic code designed for superior evasion.

Lively campaigns have been noticed focusing on customers in Italy and Brazil, with the malware supplied as Malware-as-a-Service by risk actor K1R0 on underground boards.

Underground discussion board selling Herodotus as Malware-as-a-Service (Supply – Risk Cloth)

ThreatFabric researchers recognized that Herodotus follows fashionable banking trojan tendencies whereas introducing a functionality distinguishing it from different machine takeover malware—mimicking human behaviour throughout distant management classes to bypass behavioural biometrics detection.

Main capabilities (Supply – Risk Cloth)

The malware operates by means of an an infection chain starting with side-loading, doubtlessly involving SMiShing campaigns main victims to malicious obtain hyperlinks.

As soon as deployed, Herodotus leverages a customized dropper designed to bypass Android 13+ restrictions on Accessibility Providers.

After set up, the dropper mechanically launches the payload and opens Accessibility Service settings, prompting victims to allow the service whereas displaying a misleading loading display screen overlay that conceals granting harmful permissions.

Following profitable deployment, Herodotus collects put in software lists and transmits this knowledge to its command-and-control server, which responds with focused software lists and corresponding overlay hyperlinks.

The trojan deploys faux credential-harvesting screens over professional banking purposes, capturing login credentials and two-factor authentication codes by means of SMS interception.

Humanising Fraudulent Transactions

What units Herodotus aside is its method to textual content enter automation throughout machine takeover assaults.

Conventional distant entry trojans set textual content instantly in enter fields utilizing the ACTION_SET_TEXT operate or clipboard manipulation, delivering full textual content strings instantaneously.

Nevertheless, this machine-like behaviour creates suspicious patterns that behavioural anti-fraud techniques detect as automated assault indicators.

Herodotus implements a novel approach the place operator-specified textual content is break up into particular person characters, with every character set individually at randomized intervals.

Randomization of delay between set textual content occasions (Supply – Risk Cloth)

The malware introduces delays starting from 300 to 3000 milliseconds between character enter occasions, replicating pure human typing patterns.

This randomization makes an attempt to evade rudimentary behavioural detection techniques measuring enter timing, although refined techniques modeling particular person behaviour establish anomalies.

The malware panel features a checkbox labeled “Delayed textual content” that operators toggle to allow human-like enter simulation.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Behaviour, Biometrics, Bypass, Detection, Herodotus, Human, Malware, Mimic

Post navigation

Previous Post: New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
Next Post: Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Related Posts

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code Cyber Security News
Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Cyber Security News
AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars Cyber Security News
Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition Cyber Security News
Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control Cyber Security News
Elastic Cloud Enterprise Vulnerability Let Attackers Execute Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics
  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide
  • New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments
  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics
  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide
  • New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments
  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News