Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

Posted on October 29, 2025October 29, 2025 By CWS

A complicated Android banking trojan named Herodotus has emerged on the cell risk panorama, introducing groundbreaking methods to evade detection techniques.

Throughout routine monitoring of malicious distribution channels, the Cellular Risk Intelligence service found unknown malicious samples distributed alongside infamous malware variants like Hook and Octo.

Regardless of sharing distribution infrastructure, these samples revealed nearer similarities to Brokewell, a malware household beforehand recognized by ThreatFabric analysts.

Nevertheless, Herodotus represents a definite risk combining Brokewell parts with authentic code designed for superior evasion.

Lively campaigns have been noticed focusing on customers in Italy and Brazil, with the malware supplied as Malware-as-a-Service by risk actor K1R0 on underground boards.

Underground discussion board selling Herodotus as Malware-as-a-Service (Supply – Risk Cloth)

ThreatFabric researchers recognized that Herodotus follows fashionable banking trojan tendencies whereas introducing a functionality distinguishing it from different machine takeover malware—mimicking human behaviour throughout distant management classes to bypass behavioural biometrics detection.

Main capabilities (Supply – Risk Cloth)

The malware operates by means of an an infection chain starting with side-loading, doubtlessly involving SMiShing campaigns main victims to malicious obtain hyperlinks.

As soon as deployed, Herodotus leverages a customized dropper designed to bypass Android 13+ restrictions on Accessibility Providers.

After set up, the dropper mechanically launches the payload and opens Accessibility Service settings, prompting victims to allow the service whereas displaying a misleading loading display screen overlay that conceals granting harmful permissions.

Following profitable deployment, Herodotus collects put in software lists and transmits this knowledge to its command-and-control server, which responds with focused software lists and corresponding overlay hyperlinks.

The trojan deploys faux credential-harvesting screens over professional banking purposes, capturing login credentials and two-factor authentication codes by means of SMS interception.

Humanising Fraudulent Transactions

What units Herodotus aside is its method to textual content enter automation throughout machine takeover assaults.

Conventional distant entry trojans set textual content instantly in enter fields utilizing the ACTION_SET_TEXT operate or clipboard manipulation, delivering full textual content strings instantaneously.

Nevertheless, this machine-like behaviour creates suspicious patterns that behavioural anti-fraud techniques detect as automated assault indicators.

Herodotus implements a novel approach the place operator-specified textual content is break up into particular person characters, with every character set individually at randomized intervals.

Randomization of delay between set textual content occasions (Supply – Risk Cloth)

The malware introduces delays starting from 300 to 3000 milliseconds between character enter occasions, replicating pure human typing patterns.

This randomization makes an attempt to evade rudimentary behavioural detection techniques measuring enter timing, although refined techniques modeling particular person behaviour establish anomalies.

The malware panel features a checkbox labeled “Delayed textual content” that operators toggle to allow human-like enter simulation.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Behaviour, Biometrics, Bypass, Detection, Herodotus, Human, Malware, Mimic

Post navigation

Previous Post: New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
Next Post: Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Related Posts

Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News
DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year Cyber Security News
North Korean Hackers Using EtherHiding to Deliver Malware and Steal Cryptocurrency Cyber Security News
13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center Cyber Security News
5 Best IT Infrastructure Modernisation Services In 2025 Cyber Security News
New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Exploited DELMIA Factory Software Vulnerabilities
  • New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 
  • Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
  • Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests
  • New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Exploited DELMIA Factory Software Vulnerabilities
  • New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 
  • Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
  • Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests
  • New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News