HomeLatest NewsOpinionHerodotus Android Trojan shows rise of AI malware that mimics humans to evade detection

Herodotus Android Trojan shows rise of AI malware that mimics humans to evade detection

As the Herodotus banking Trojan showcases, attackers are fusing automation with human-like behavior to bypass security systems — demanding identity-first, zero-trust defenses that detect intent, not just activity.

Preferred Source of Google

By Darren Guccione

The Herodotus Android banking Trojan demonstrates an evolving threat vector, one in which  malicious code increasingly imitates human behaviuor, inserting subtle pauses and delays to appear human and bypass detection.

It exemplifies how attackers are leveraging automation and agentic intelligence to mimic legitimate user interactions to evade the very systems designed to stop them.

Advertisement
Saksham Bharat 2026
Saksham Bharat 2026
A multi-stakeholder dialogue on skilling gap in Cybersecurity, Data Resilience and AI — and the roadmap to a Saksham Bharat.
Register Now →
VeeamON 2026 Tour India - Mumbai
VeeamON 2026 Tour India - Mumbai
A VeeamON 2026 India Leadership Series Mumbai for senior public sector and government technology leaders.
Register Now →
Cyber Surakshit Uttar Pradesh
Cyber Surakshit Uttar Pradesh
Find out strategies, frameworks and solutions for building a resilient and secure digital ecosystem across Uttar Pradesh.
Register Now →
VeeamON 2026 Tour India - Bengaluru
VeeamON 2026 Tour India - Bengaluru
A VeeamON 2026 India Leadership Series Bengaluru for senior public sector and government technology leaders.
Register Now →
VeeamON 2026 Tour India - Delhi
VeeamON 2026 Tour India - Delhi
A VeeamON 2026 India Leadership Series Delhi for senior public sector and government technology leaders.
Register Now →
Infosec Reimagined
Infosec Reimagined
Infosec Reimagined 2026 is the premier information security summit where top leaders—CISOs, CROs, CIOs, CTOs and risk executives—converge to redefine cyber resilience.
Register Now →
Digital Senate
Digital Senate
Digital Senate is a premier conference uniting government leaders, technologists and innovators to share ideas, success stories and strategies on digital governance, public sector transformation, cybersecurity and emerging technologies in India.
Register Now →
CIO Prism
CIO Prism
CIO Prism unites forward-thinking technology leaders to exchange transformative insights, shape digital strategies, and foster innovation, empowering enterprises to excel in an era of rapid technological change.
Register Now →

Security tools that rely solely on rhythm, keystroke cadence or user timing will inevitably struggle to identify these new forms of automation. What’s required now is deeper visibility at the process and session level, with the ability to correlate behavioural, contextual and environmental data in real time.

Google’s statement confirming that no infected apps were found on Play and that Play Protect is blocking known variants is reassuring. However, threat actors continue to exploit side-loading, social engineering and third-party channels – bypassing trusted app ecosystems and preying on user complacency.

It highlights an ongoing challenge in mobile security: platform-level defences can only defend against known threats. Attackers are now deploying polymorphic, AI-enhanced capable of altering its behaviour in real time to evade detection.

Advertisement

For organisations – particularly those supporting bring-your-own-device environments – this evolution reinforces the need for continuous behavioural monitoring and identity-first security. Security posture must extend beyond endpoints to session-level analysis, enabling detection of anomalies that appear human but deviate from expected context or privilege level.

This is precisely where and privileged access management frameworks become critical. Every digital interaction, whether from a human, a bot or an AI agent, must be continuously authenticated, authorised and monitored. Modern threats like Herodotus don’t just exploit software vulnerabilities; they exploit identity verification gaps and over-privileged access.

We are seeing a fundamental shift towards identity-first, AI-assisted cybersecurity, where privilege boundaries are constantly validated, and automation itself is secured. Every entity – human or non-human – must operate within tightly controlled, auditable access boundaries.

Advertisement

By combining real-time session telemetry, command analytics and contextual risk scoring, security teams can enable AI-driven defences that distinguish intent from imitation at machine speed.

The goal isn’t simply to identify malicious activity after the fact, but to prevent privilege misuse or unauthorised automation before it occurs.

The organisations that embrace continuous, context-aware monitoring grounded in zero trust principles will be the best equipped to defend against this new era of adaptive, behaviour-mimicking threats.

The author is & Co-founder, Keeper Security. Views are personal.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Powered By Veeam Logo
- Advertisement -

Subscribe to our Newsletter

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

India to Lead Global IT Security Standards Body for Two Years

India will chair the Common Criteria Development Board from April 2026, gaining influence over international IT security certification standards recognised by 38 countries.

RELATED ARTICLES