Cybersecurity researchers say a new piece of malware infecting Android devices mimics human tendencies to steal banking credentials and initiate account takeovers. ThreatFabric analysts say the Herodotus trojan is designed to mirror human behavior and bypass behavioral biometric detection using code from a previously identified malware family. The malicious software emulates human habits by purposefully […] The post Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric appeared first on The Daily Hodl.Cybersecurity researchers say a new piece of malware infecting Android devices mimics human tendencies to steal banking credentials and initiate account takeovers. ThreatFabric analysts say the Herodotus trojan is designed to mirror human behavior and bypass behavioral biometric detection using code from a previously identified malware family. The malicious software emulates human habits by purposefully […] The post Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric appeared first on The Daily Hodl.

Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric

2025/11/10 16:04
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

Cybersecurity researchers say a new piece of malware infecting Android devices mimics human tendencies to steal banking credentials and initiate account takeovers.

ThreatFabric analysts say the Herodotus trojan is designed to mirror human behavior and bypass behavioral biometric detection using code from a previously identified malware family.

The malicious software emulates human habits by purposefully delaying and splitting text input into individual characters to evade bot and automation detection tools and behavioral biometrics.

“Delay specified is in the range of 300 – 3000 milliseconds (0.3 – 3 seconds). Such a randomisation of delay between text input events does align with how a user would input text. By consciously delaying the input by random intervals, actors are likely trying to avoid being detected by behavior-only anti-fraud solutions spotting the machine-like speed of text input…

It is under active development, borrows techniques long associated with the Brokewell banking Trojan, and appears purpose-built to persist inside live sessions rather than simply steal static credentials and focus on account takeover.”

Researchers say they are still investigating how the malware is distributed, believing it may involving SMiShing campaigns, which target individuals by sending text messages that contain a malicious link.

Herodotus also manipulates device functionality by exploiting Android’s Accessibility Services while overlaying screens with fake pages to steal banking credentials.

ThreatFabric analysts say they spotted Herodotus in active campaigns in Brazil and Italy involving apps named Banca Sicura and Modulo Seguranca Stone. While there are no active campaigns outside the two countries, researchers note that overlay pages used by Herodotus were seen targeting crypto wallets and exchanges as well as financial firms in the US, Turkey, the UK and Poland.

“Considering that the malware is still in an active development state, we can expect Herodotus further evolving and used widely in global campaigns.”

Follow us on X, Facebook and Telegram
Don't Miss a Beat – Subscribe to get email alerts delivered directly to your inbox
Check Price Action
Surf The Daily Hodl Mix

 
Disclaimer: Opinions expressed at The Daily Hodl are not investment advice. Investors should do their due diligence before making any high-risk investments in Bitcoin, cryptocurrency or digital assets. Please be advised that your transfers and trades are at your own risk, and any losses you may incur are your responsibility. The Daily Hodl does not recommend the buying or selling of any cryptocurrencies or digital assets, nor is The Daily Hodl an investment advisor. Please note that The Daily Hodl participates in affiliate marketing.

Generated Image: Midjourney

The post Hackers Target Android User’s Bank Accounts As New Malware Emulates Human Habits To Evade Detection: ThreatFabric appeared first on The Daily Hodl.

시장 기회
Lorenzo Protocol 로고
Lorenzo Protocol 가격(BANK)
$0.02752
$0.02752$0.02752
-1.99%
USD
Lorenzo Protocol (BANK) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!