Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Mobile Security

a banking trojan that exposes the limits of an antivirus

Cyberinchief by Cyberinchief
November 8, 2025
Reading Time: 3 mins read
0
a banking trojan that exposes the limits of an antivirus


RELATED POSTS

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

Emerging Technology Management for Modern IT Leaders

Adopting Blueprints in Jamf Tools

A new Android banking Trojan, Herodotus, has been circulating in recent weeks. Offered as Malware-as-a-Service (MaaS), it disguises itself as a legitimate application to convince users to install an APK. Once installed, it requests sensitive permissions and can take control of the device to perform banking operations on behalf of the user.
A modern mobile attack, yet once again, largely invisible to most traditional antivirus solutions.

 

Herodotus in brief

The banking trojan spreads through SMS phishing links that redirect users to a fake page prompting them to download an application. The victim then installs an APK outside the Play Store.
Once installed and granted permissions, Herodotus requests critical permissions (including Accessibility), overlays fake screens on top of legitimate applications to deceive the user, and can capture the screen and keystrokes. Its goal is session takeover, which is performing operations while the victim is actively logged in.

To bypass anti-fraud systems, Herodotus “humanizes” its actions with random delays, micro-movements, and realistic typing patterns to make automation much more difficult to detect

 

Why an antivirus isn’t enough

The Pradeo team searched for the malware in the database of a leading antivirus provider : no alert was raised on the application’s content. In other words, the antivirus failed to flag the malicious applicatio, even though it clearly appears as such when searched for using a simple search engine.

Buy JNews
ADVERTISEMENT

This can be explained by how antivirus solutions work, they rely mainly on known signatures and previously observed behaviors. A malicious application obtained through SMS phishing and installed outside the Play Store may easily go undetected if its code is new and its dangerous actions are only triggered after installation and permission approval.

Effective detection, in this case, depends on chaining multiple indicators of compromise : a suspicious SMS link leading to an unknown source, installation from outside the store, critical permission requests, followed by visible signs such as screen overlays, simulated interactions, or screen captures.
Individually, these signals may seem harmless, but together, and in their sequence, they clearly reveal an ongoing attack that an antivirus can easily miss.

 

How Pradeo Mobile Threat Defense blocks the attack

Unlike an antivirus, a Mobile Threat Defense (MTD) solution observes the real behavior of the device and acts at every stage of the attack chain:

  1. Phishing link blocking:
    Thanks to the anti-phishing module built into the Pradeo Security application, access to the malicious page is directly prevented. The user never reaches the download page and therefore cannot retrieve the APK.
  2. Prevention of risky installations :
    Pradeo Mobile Threat Defense detects that an application originates from an unknown source and immediately alerts the security team to prevent potential compromise.
  3. Monitoring of permissions and behaviors :
    • When an application requests critical permissions (such as Accessibility), Pradeo Mobile Threat Defense flags it as potentially malicious and quarantines it, preventing any device takeover or intrusive actions.
    • Our solution also monitors UI and system behaviors (overlays, simulated taps, abnormal network activity). At the first sign of a malicious overlay, access to sensitive applications is immediately blocked.

The Herodotus case clearly illustrates that antivirus solutions are not suited to modern mobile threats, which combine social engineering, off-store installations, and abuse of sensitive permissions.
To effectively protect collaborators and corporate data, deploying a Mobile Threat Defense (MTD) solution is now essential.



Source link

Tags: AntivirusBankingExposeslimitsTrojan
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
Mobile Security

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

January 21, 2026
Emerging Technology Management for Modern IT Leaders
Mobile Security

Emerging Technology Management for Modern IT Leaders

December 8, 2025
Adopting Blueprints in Jamf Tools
Mobile Security

Adopting Blueprints in Jamf Tools

December 8, 2025
Jamf Safe Internet + On-Device Phishing AI
Mobile Security

Jamf Safe Internet + On-Device Phishing AI

December 7, 2025
Act on Jamf Protect Alerts
Mobile Security

Act on Jamf Protect Alerts

December 7, 2025
Terraform + GitLab CI/CD for Jamf
Mobile Security

Terraform + GitLab CI/CD for Jamf

December 6, 2025
Next Post
CYBER SECURITY BASICS – VIDEO 1 | ZERO TO HERO | TAMIL #learncybersecurity  #youtubetech #tamiltech

CYBER SECURITY BASICS - VIDEO 1 | ZERO TO HERO | TAMIL #learncybersecurity #youtubetech #tamiltech

Cloudflare Scrubs Aisuru Botnet from Top Domains List – Krebs on Security

Cloudflare Scrubs Aisuru Botnet from Top Domains List – Krebs on Security

Recommended Stories

Cyber Fraud Crime : सायबर धोका! अक्षय कुमारच्या मुलीकडे न्यूड फोटोची मागणी

Cyber Fraud Crime : सायबर धोका! अक्षय कुमारच्या मुलीकडे न्यूड फोटोची मागणी

October 13, 2025
Cyber Crime Department Ki Victory | ft. Riddhi Kumar, Vipul Gupta | Hack Crimes Online #amazonminitv

Cyber Crime Department Ki Victory | ft. Riddhi Kumar, Vipul Gupta | Hack Crimes Online #amazonminitv

November 26, 2025
How to Unfreeze Bank Account || Cyber Crime In India #bankaccountfreeze

How to Unfreeze Bank Account || Cyber Crime In India #bankaccountfreeze

November 15, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested