New Android malware mimics human typing to evade detection, steal money
嗯,用户让我总结一篇关于安卓银行木马Herodotus的文章,控制在100字以内,而且不需要用特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章提到Herodotus是一种新的安卓银行木马,由黑客K1R0开发。它通过模仿人类行为来逃避检测,比如在远程控制受感染设备时,逐字符输入并随机暂停。此外,它伪装成安全应用,在意大利和巴西传播,并针对多国的银行和加密平台。研究人员警告说,这种木马对金融机构构成新挑战。 接下来,我需要把这些要点浓缩到100字以内。要确保涵盖主要功能、传播方式、伪装手段以及带来的威胁。同时,语言要简洁明了。 可能的结构是:介绍木马名称、功能、传播方式、伪装手段、技术特点(如模仿人类行为)、影响范围以及对金融机构的威胁。 现在组织语言:Herodotus是一种新的安卓银行木马,由黑客K1R0开发,通过伪装成安全应用并模仿人类行为来逃避检测。它能远程控制设备窃取资金,并针对多国银行和加密平台。研究人员警告其对金融机构构成新挑战。 检查字数是否在限制内,并确保信息准确无误。 </think> 研究人员发现了一种名为Herodotus的新安卓银行木马,该恶意软件通过模仿人类行为来逃避检测,并远程控制受感染设备窃取资金。它伪装成安全应用,在意大利和巴西传播,并针对多国银行和加密平台。研究人员警告其对金融机构构成新挑战。 2025-10-28 15:46:9 Author: therecord.media(查看原文) 阅读量:3 收藏

Researchers have discovered a new Android banking malware called Herodotus that evades detection by mimicking human behavior when remotely controlling infected devices.

The malware — developed by a little-known hacker who goes by the name K1R0 — can take full control of a victim’s phone to steal money from banking apps and online accounts. According to a report released Tuesday by Dutch cybersecurity firm ThreatFabric, the developer has advertised plans to sell the tool as a service on underground forums.

Researchers said they have observed active campaigns using the malware in Italy and Brazil. In Italy, Herodotus disguised itself as an app called Banca Sicura (“Safe Bank”), while in Brazil it posed as Modulo Seguranca Stone, likely pretending to be a security module for a local payment provider.

ThreatFabric also found fake overlay pages that Herodotus can display on top of legitimate apps used by banks and cryptocurrency platforms in the U.S., U.K., Turkey, Poland and other countries.

“Considering that the malware is still in an active development stage, we can expect Herodotus to further evolve and be used widely in global campaigns,” the company said.

Herodotus works like many modern Android banking trojans. Operators distribute it through SMS messages that trick users into downloading a malicious installer. Once installed, the malware waits for a targeted app to open and then overlays a fake screen that mimics the real banking or payment interface to steal credentials. It also intercepts incoming SMS messages to capture one-time passcodes and exploits Android’s accessibility features to read what’s shown on the device screen.

What makes Herodotus unusual, ThreatFabric said, is that it tries to “humanize” the actions attackers perform during remote control. Instead of pasting account or transaction details into form fields all at once — a behavior that can easily be flagged as automated — the malware types each character separately with random pauses of about 0.3 to 3 seconds between keystrokes, imitating how a real person would type.

ThreatFabric warned that the rise of mobile malware like Herodotus poses new challenges for banks and payment providers. Fraud controls that rely mainly on factors such as interaction tempo and keystroke cadence can still detect suspicious activity, but it’s most effective when paired with other security measures that monitor not only user behavior but also the device environment to identify threats like Herodotus, the company added.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/android-malware-mimics-humans-avoid-detection
如有侵权请联系:admin#unsafe.sh