Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

Posted on October 29, 2025October 29, 2025 By CWS

A complicated Android banking trojan named Herodotus has emerged on the cell risk panorama, introducing groundbreaking methods to evade detection techniques.

Throughout routine monitoring of malicious distribution channels, the Cellular Risk Intelligence service found unknown malicious samples distributed alongside infamous malware variants like Hook and Octo.

Regardless of sharing distribution infrastructure, these samples revealed nearer similarities to Brokewell, a malware household beforehand recognized by ThreatFabric analysts.

Nevertheless, Herodotus represents a definite risk combining Brokewell parts with authentic code designed for superior evasion.

Lively campaigns have been noticed focusing on customers in Italy and Brazil, with the malware supplied as Malware-as-a-Service by risk actor K1R0 on underground boards.

Underground discussion board selling Herodotus as Malware-as-a-Service (Supply – Risk Cloth)

ThreatFabric researchers recognized that Herodotus follows fashionable banking trojan tendencies whereas introducing a functionality distinguishing it from different machine takeover malware—mimicking human behaviour throughout distant management classes to bypass behavioural biometrics detection.

Main capabilities (Supply – Risk Cloth)

The malware operates by means of an an infection chain starting with side-loading, doubtlessly involving SMiShing campaigns main victims to malicious obtain hyperlinks.

As soon as deployed, Herodotus leverages a customized dropper designed to bypass Android 13+ restrictions on Accessibility Providers.

After set up, the dropper mechanically launches the payload and opens Accessibility Service settings, prompting victims to allow the service whereas displaying a misleading loading display screen overlay that conceals granting harmful permissions.

Following profitable deployment, Herodotus collects put in software lists and transmits this knowledge to its command-and-control server, which responds with focused software lists and corresponding overlay hyperlinks.

The trojan deploys faux credential-harvesting screens over professional banking purposes, capturing login credentials and two-factor authentication codes by means of SMS interception.

Humanising Fraudulent Transactions

What units Herodotus aside is its method to textual content enter automation throughout machine takeover assaults.

Conventional distant entry trojans set textual content instantly in enter fields utilizing the ACTION_SET_TEXT operate or clipboard manipulation, delivering full textual content strings instantaneously.

Nevertheless, this machine-like behaviour creates suspicious patterns that behavioural anti-fraud techniques detect as automated assault indicators.

Herodotus implements a novel approach the place operator-specified textual content is break up into particular person characters, with every character set individually at randomized intervals.

Randomization of delay between set textual content occasions (Supply – Risk Cloth)

The malware introduces delays starting from 300 to 3000 milliseconds between character enter occasions, replicating pure human typing patterns.

This randomization makes an attempt to evade rudimentary behavioural detection techniques measuring enter timing, although refined techniques modeling particular person behaviour establish anomalies.

The malware panel features a checkbox labeled “Delayed textual content” that operators toggle to allow human-like enter simulation.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Behaviour, Biometrics, Bypass, Detection, Herodotus, Human, Malware, Mimic

Post navigation

Previous Post: New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
Next Post: Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Related Posts

ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability Cyber Security News
Top 30 Best Penetration Testing Tools Top 30 Best Penetration Testing Tools Cyber Security News
NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation Cyber Security News
Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Cyber Security News
Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums Cyber Security News
New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark