Cybersecurity researchers say a new piece of malware infecting Android devices mimics human tendencies to steal banking credentials and initiate account takeovers. ThreatFabric analysts say the Herodotus trojan is designed to mirror human behavior and bypass behavioral biometric detection using code from a previously identified malware family. The malicious software emulates human habits by purposefully […] The post Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric appeared first on The Daily Hodl.Cybersecurity researchers say a new piece of malware infecting Android devices mimics human tendencies to steal banking credentials and initiate account takeovers. ThreatFabric analysts say the Herodotus trojan is designed to mirror human behavior and bypass behavioral biometric detection using code from a previously identified malware family. The malicious software emulates human habits by purposefully […] The post Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric appeared first on The Daily Hodl.

Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric

2025/11/10 16:04
3 min read
For feedback or concerns regarding this content, please contact us at [email protected]

Cybersecurity researchers say a new piece of malware infecting Android devices mimics human tendencies to steal banking credentials and initiate account takeovers.

ThreatFabric analysts say the Herodotus trojan is designed to mirror human behavior and bypass behavioral biometric detection using code from a previously identified malware family.

The malicious software emulates human habits by purposefully delaying and splitting text input into individual characters to evade bot and automation detection tools and behavioral biometrics.

“Delay specified is in the range of 300 – 3000 milliseconds (0.3 – 3 seconds). Such a randomisation of delay between text input events does align with how a user would input text. By consciously delaying the input by random intervals, actors are likely trying to avoid being detected by behavior-only anti-fraud solutions spotting the machine-like speed of text input…

It is under active development, borrows techniques long associated with the Brokewell banking Trojan, and appears purpose-built to persist inside live sessions rather than simply steal static credentials and focus on account takeover.”

Researchers say they are still investigating how the malware is distributed, believing it may involving SMiShing campaigns, which target individuals by sending text messages that contain a malicious link.

Herodotus also manipulates device functionality by exploiting Android’s Accessibility Services while overlaying screens with fake pages to steal banking credentials.

ThreatFabric analysts say they spotted Herodotus in active campaigns in Brazil and Italy involving apps named Banca Sicura and Modulo Seguranca Stone. While there are no active campaigns outside the two countries, researchers note that overlay pages used by Herodotus were seen targeting crypto wallets and exchanges as well as financial firms in the US, Turkey, the UK and Poland.

“Considering that the malware is still in an active development state, we can expect Herodotus further evolving and used widely in global campaigns.”

Follow us on X, Facebook and Telegram
Don't Miss a Beat – Subscribe to get email alerts delivered directly to your inbox
Check Price Action
Surf The Daily Hodl Mix

 
Disclaimer: Opinions expressed at The Daily Hodl are not investment advice. Investors should do their due diligence before making any high-risk investments in Bitcoin, cryptocurrency or digital assets. Please be advised that your transfers and trades are at your own risk, and any losses you may incur are your responsibility. The Daily Hodl does not recommend the buying or selling of any cryptocurrencies or digital assets, nor is The Daily Hodl an investment advisor. Please note that The Daily Hodl participates in affiliate marketing.

Generated Image: Midjourney

The post Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric appeared first on The Daily Hodl.

Market Opportunity
Lorenzo Protocol Logo
Lorenzo Protocol Price(BANK)
$0.02788
$0.02788$0.02788
-0.71%
USD
Lorenzo Protocol (BANK) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!