Herodotus malware targeting Android users behaves like a human to avoid detection


Cybersecurity experts are sounding the alarm about a new Android Trojan called Herodotus, designed to deliberately slow down its own malicious activity to mimic the occasional, imperfect behavior of a human user. Such behavior allows the malware to evade a generation of security systems designed to signal the faster robotic actions of traditional robots.

Herodotus Malware Thread (Click to enlarge)

Detected by security company Threat Fabric, Herodotus is a banking Trojan advertised/sold on underground cybercrime forums. Similar to the Brokewell malware discovered last year, Herodotus’ ultimate goal is financial fraud, which it achieves by leveraging Android accessibility services to create fake login overlays and steal credentials, as well as intercepting one-time passcodes (OTPs) via an SMS thief. However, his real innovation lies in the subtle art of deception: the timing of his inputs.

Now, when a traditional Trojan accesses a device and attempts to insert a victim’s stolen banking information, it often bypasses the on-screen keyboard by using the device’s clipboard or accessibility services to paste the text. This input method is instantaneous, which is of course the telltale sign of a machine running at inhuman speed. Behavioral detection systems, especially those at financial institutions, are specifically designed to look for this unusually fast typing speed, thereby flagging the transaction as suspicious.
Code adding random text entry delay

Herodotus, on the other hand, gets around this problem with a brilliant, if troubling, measure: he introduces a random delay. Each time the malware inserts credentials, it injects an unpredictable pause of between 0.3 and 3 seconds, which is enough to fool many basic detection systems that expect either impossible acceleration or a consistent, non-human pattern. The deliberate slowness is meant to suggest that an actual user, perhaps an elderly person or someone simply taking a break from typing, is manually entering their login information.

Herodotus is allegedly distributed by tricking victims into downloading apps, often using smishing messages containing a link to a “dropper” app. Once installed and granted the elevated permissions it requires by tricking the user, it can deploy its full suite of features.

According to Threat Fabric, Herodotus developers appear to have integrated a compiled Brokewell modulewhich implies that they iterate on existing tools rather than owning the complete original source code. Nonetheless, the emergence of Herodotus means that the need for cybersecurity defenders with behavioral biometric models—that is, the ability to distinguish between a slow, authentic human and a machine that has been expertly programmed to be imperfect—is more paramount than ever.

Screenshot Credits: Threat Fabric

Leave a Reply

Your email address will not be published. Required fields are marked *