2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The Herodotus malware family targets Android devices by using random delays to imitate human typing, making it harder for security software to detect. Currently distributed through SMS phishing, it can bypass Accessibility permissions and interact with the user interface to steal sensitive information. Experts warn Android users to be cautious about app permissions and avoid downloading apps from untrusted sources.
If you do, here's more
Herodotus is a new family of Android malware that cleverly imitates human typing patterns to avoid detection by security software. It achieves this through a mechanism that introduces random delays of 0.3 to 3 seconds between keystrokes, making its actions appear more human-like. This malware, offered as a malware-as-a-service (MaaS), is linked to the same cybercriminals behind Brokewell and is currently targeting users in Italy and Brazil via SMS phishing, or smishing.
Once a victim clicks on a malicious link in a phishing text, a custom dropper installs the malware by bypassing Accessibility restrictions in Android 13 and later versions. The dropper tricks users into granting permissions by showing a fake loading screen while it operates in the background. With these permissions, Herodotus can interact with the deviceβs user interface, execute commands, and capture sensitive information. It also features capabilities such as creating custom SMS texts, overlay pages that mimic legitimate banking apps to steal credentials, and intercepting two-factor authentication codes.
Threat Fabric has identified multiple subdomains linked to the Herodotus malware, indicating a growing operational presence. For Android users, the recommended precautions include avoiding APK downloads from untrusted sources and keeping Google Play Protect enabled. Itβs also crucial to review and revoke unnecessary permissions for new apps, especially Accessibility permissions, to minimize the risk of infection.
Questions about this article
No questions yet.