New Android malware mimics human typing to evade detection, steal money

Researchers have discovered a new Android banking malware called Herodotus that evades detection by mimicking human behavior when remotely controlling infected devices.

The malware — developed by a little-known hacker who goes by the name K1R0 — can take full control of a victim’s phone to steal money from banking apps and online accounts. According to a report released Tuesday by Dutch cybersecurity firm ThreatFabric, the developer has advertised plans to sell the tool as a service on underground forums.

Researchers said they have observed active campaigns using the malware in Italy and Brazil. In Italy, Herodotus disguised itself as an app called Banca Sicura (“Safe Bank”), while in Brazil it posed as Modulo Seguranca Stone, likely pretending to be a security module for a local payment provider.

ThreatFabric also found fake overlay pages that Herodotus can display on top of legitimate apps used by banks and cryptocurrency platforms in the U.S., U.K., Turkey, Poland and other countries.

“Considering that the malware is still in an active development stage, we can expect Herodotus to further evolve and be used widely in global campaigns,” the company said.

Herodotus works like many modern Android banking trojans. Operators distribute it through SMS messages that trick users into downloading a malicious installer. Once installed, the malware waits for a targeted app to open and then overlays a fake screen that mimics the real banking or payment interface to steal credentials. It also intercepts incoming SMS messages to capture one-time passcodes and exploits Android’s accessibility features to read what’s shown on the device screen.

What makes Herodotus unusual, ThreatFabric said, is that it tries to “humanize” the actions attackers perform during remote control. Instead of pasting account or transaction details into form fields all at once — a behavior that can easily be flagged as automated — the malware types each character separately with random pauses of about 0.3 to 3 seconds between keystrokes, imitating how a real person would type.

ThreatFabric warned that the rise of mobile malware like Herodotus poses new challenges for banks and payment providers. Fraud controls that rely mainly on factors such as interaction tempo and keystroke cadence can still detect suspicious activity, but it’s most effective when paired with other security measures that monitor not only user behavior but also the device environment to identify threats like Herodotus, the company added.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

New Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a Human

Next Post

Researchers warn of Qilin ransomware gang after group hit hundreds of orgs this year

Related Posts

Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-2611 (CVSS score: 9.3), relates to improper input validation that can result in unauthenticated remote code execution due to the fact that the call center
Read More

Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC-0245. The agency said it spotted the attack following the discovery of software tools taking the form of XLL files, which refer to Microsoft Excel
Read More