Skip links

New Herodotus Android malware fakes human typing to avoid detection

Share:

Facebook
Twitter
Pinterest
LinkedIn

A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade timing-based detection by security software.

Herodotus, according to Threat Fabric, is offered as a malware-as-a-service (MaaS) to financially motivated cybercriminals, believed to be the same operators behind Brokewell.

Although the malware is still in development, clients of the new MaaS platform are currently deploying it against Italian and Brazilian users through SMS phishing (smishing) text messages.

Announcing the new Herodotus MaaS
Source: Threat Fabric

The malicious SMS contains a link to a custom dropper that installs the primary payload and attempts to bypass Accessibility permission restrictions present in Android 13 and later.

The dropper opens Accessibility settings, prompts the user to enable the service, and then displays an overlay window that shows a fake loading screen, hiding the permission-granting steps in the background.

Having granted itself access to these sensitive permissions, Herodotus can now interact with the Android user interface, such as tapping at specific screen coordinates, swiping, going back, and entering text (clipboard paste or keyboard typing).

However, automated actions, such as typing, on the user interface may not match the same rhythm or cadence as humans, making them noticeable to security software that looks for unusual patterns in behavior.

To evade detection, the malware includes a ‘humanizer’ mechanism for the text input action, which causes it to type with random delays of 0.3 to 3 seconds, mimicking human typing and evading detection.

“Such a randomisation of delay between text input events does align with how a user would input text,” explains Threat Fabric.

“By consciously delaying the input by random intervals, actors are likely trying to avoid being detected by behaviour-only anti-fraud solutions spotting machine-like speed of text input.”

Adding random text input delay
Source: Threat Fabric

Threat Fabric says that delays in Android malware are typically used to allow app UI to respond to inputs before moving to the next action, adding that Herodotus’ randomized delays are a completely novel take, most likely implemented to evade behavioral detection systems.

Apart from the above features, Herodotus also provides operators with the following: 

Control panel with options for custom SMS text
Overlay pages mimicking banking and crypto apps to steal account credentials
Opaque overlays that hide fraud from the victim
SMS stealer for two-factor authentication code interception
Capturing screen content

The Herodotus admin panel
Source: Threat Fabric

Currently, Threat Fabric reports that Herodotus is spread by several threat actors, based on the detection of seven distinct subdomains, indicating its adoption in the wild has already begun.

To mitigate this risk, Android users should avoid downloading APK files from outside Google Play unless they explicitly trust the publisher and ensure Play Protect is active on their device.

Even with these precautions, it is essential to scrutinize and revoke risky permissions, such as Accessibility, for newly installed apps.

46% of environments had passwords cracked, nearly doubling from 25% last year.

Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Adblock test (Why?)

Share:

Facebook
Twitter
Pinterest
LinkedIn
Explore
Drag