Cybersecurity researchers at ThreatFabric have discovered a new Android banking trojan named Herodotus. Distributed under a Malware-as-a-Service (MaaS) model, this device-takeover malware introduces a novel evasion technique designed to bypass modern fraud detection systems. Herodotus simulates human-like typing by adding randomized delays to its inputs during remote sessions, allowing it to defeat behavioral biometric security controls. The malware, spread via SMS phishing (SMiShing), grants attackers full remote control to steal credentials, intercept one-time passcodes (OTPs), and execute fraudulent transactions from banking and cryptocurrency apps. Active campaigns are currently targeting users in Italy and Brazil.
Herodotus is the latest entry in the growing market of sophisticated Android banking malware. It is sold by a threat actor named 'K1R0' and is designed for full device takeover.
Infection Chain:
The most innovative feature of Herodotus is its defense evasion capability against behavioral biometrics.
'Confirm Transfer'), and entering data.Active campaigns have been observed disguising the malware as a security app for an Italian bank and a security module for a Brazilian payment provider.
Herodotus poses a direct financial threat to Android users worldwide. By defeating a key layer of modern anti-fraud defense, it increases the likelihood of successful fraudulent transactions. The MaaS model ensures that even low-skilled criminals can rent the malware and launch their own campaigns, broadening its reach.
Educating users not to click links in suspicious SMS messages and not to install apps from outside the official app store.
Configuring Android devices to block the installation of apps from unknown sources (sideloading).
Using Mobile Threat Defense (MTD) solutions to detect and block malicious behaviors like the abuse of Accessibility Services.
The most effective defense against Herodotus is to prevent its installation. Organizations should enforce a strict mobile device management (MDM) policy that disables 'Install from unknown sources' on all managed Android devices. This prevents users from sideloading APKs from websites linked in SMiShing messages, which is the primary infection vector for this malware. For unmanaged devices (BYOD), user education is key, but for corporate-owned devices, this technical control is paramount and effectively closes the door on this threat.
To detect the malware's core abuse, security teams should monitor for anomalous permission grants, specifically for Android's Accessibility Services. A Mobile Threat Defense (MTD) solution can be configured to generate a high-priority alert whenever a non-system application, especially one that was recently installed, requests Accessibility Service permissions. Since very few legitimate applications require this level of access, such a request is a very strong indicator of compromise. This allows security teams to investigate and quarantine the device before a full takeover can occur.
Since Herodotus relies on tricking the user, ongoing security awareness training is essential. Training should specifically cover the dangers of SMiShing and the tactics used, such as messages creating false urgency about account security. Users should be taught to never click links in unexpected text messages and to be extremely suspicious of any app that asks them to enable Accessibility Services, explaining that this permission grants total control of their device. Simulations can help reinforce this knowledge and build user resilience to these social engineering tactics.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats