Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

New Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human

Researchers expose GhostCall and GhostHire: BlueNoroff’s new malware chain

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human
Identity

New Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human

userBy userOctober 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 28, 2025Ravi LakshmananMalware/Mobile Security

Android Trojan

Cybersecurity researchers have revealed details of a new Android banking Trojan called Herodotus that has been observed in active campaigns targeting Italy and Brazil carrying out device takeover (DTO) attacks.

“Herodotus is designed to perform device takeover while mimicking human behavior and making initial attempts to evade biometric detection of actions,” ThreatFabric said in a report shared with The Hacker News.

According to the Dutch security firm, the Trojan was first advertised on underground forums on September 7, 2025 as part of a malware-as-a-service (MaaS) model, touting its ability to run on devices running Android versions 9 to 16.

DFIR retainer service

It has been assessed that this malware is not a direct evolution of another banking malware known as Brokewell, but appears to have incorporated parts of it to create a new variant. This includes similarities in the obfuscation techniques used, as well as direct references to Brokewell in Herodotus (such as “BRKWL_JAVA”).

Herodotus is also the latest in a long list of Android malware that exploits accessibility services to achieve its goals. Distributed via a dropper app (package name com.cd3.app) disguised as Google Chrome through SMS phishing and other social engineering tactics, the malicious program takes advantage of accessibility features to manipulate the screen, provide opaque overlay screens to hide malicious activity, and perform credential theft by displaying fake login screens on top of financial apps.

Additionally, it can steal two-factor authentication (2FA) codes sent via SMS, intercept everything you see on your screen, grant itself additional permissions if needed, obtain your lock screen PIN or pattern, and even install remote APK files.

But what sets this new malware apart is its ability to humanize its deception and evade timing-based detection. Specifically, this includes an option to introduce a random delay when starting a remote action, such as entering text on the device. According to ThreatFabric, this is an attempt by threat actors to make the input appear as if it is being entered by a real user.

CIS build kit

“The specified delay ranges from 300 to 3000 milliseconds (0.3 to 3 seconds).” “Such randomization of delays between text input events is consistent with how users enter text. By consciously delaying input at random intervals, attackers may be attempting to avoid detection by behavioral-only anti-fraud solutions that discover machine-like speeds of text input.”

ThreatFabric said it also obtained an overlay page used by Herodotus that targets financial institutions in the US, Turkey, UK, and Poland, as well as cryptocurrency wallets and exchanges, indicating that the operator is actively seeking to expand its horizons.

“It is in active development, borrows technology long associated with the Brokewell banking Trojan, and appears to be built to persist within live sessions, rather than simply stealing static credentials and focusing on account takeover,” the company said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers expose GhostCall and GhostHire: BlueNoroff’s new malware chain
Next Article New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves
user
  • Website

Related Posts

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

October 28, 2025

Researchers expose GhostCall and GhostHire: BlueNoroff’s new malware chain

October 28, 2025

Why early threat detection is essential for long-term business growth

October 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

New Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human

Researchers expose GhostCall and GhostHire: BlueNoroff’s new malware chain

TechCrunch Disrupt 2025: How to watch Vinod Khosla, Netflix, Slate Auto, and Startup Battlefield

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.