The Android malware ecosystem just evolved again and not in your favor. A new banking trojan named Sturnus is circulating in the wild, and its capabilities push it far beyond the typical spyware junk you’re used to hearing about. This one can monitor encrypted chats, steal banking credentials, take full device control, and drain bank accounts without users realizing what’s happening until it’s too late.
Here’s the blunt truth: If this malware gains accessibility permissions on your phone, the attacker owns you. Full stop.
What Exactly Is Sturnus?
Sturnus is a privately operated Android banking trojan currently being analyzed by ThreatFabric. It’s not a mass-market commodity malware — it’s a targeted tool built for financial fraud with advanced espionage capabilities.
The standout ability? It bypasses the encryption of apps like WhatsApp, Telegram, and Signal by capturing the screen after decryption, directly at the device level. End-to-end encryption becomes meaningless when malware can see what you see.
Key Capabilities That Make Sturnus Extremely Dangerous
This isn’t just another password-stealing nuisance. Sturnus combines multiple attack layers:
1. Overlay Attacks for Banking Apps
It can display pixel-perfect fake login screens on top of banking apps. You enter your details thinking it’s legitimate. The attacker gets your credentials instantly.
2. Full VNC-Style Remote Control
It sets up a WebSocket channel that lets attackers remotely interact with your phone like a virtual machine.
This means they can:
- Navigate apps
- Perform transactions
- Read SMS/OTP messages
- Approve fraudulent payments
and you may not notice anything happening.
3. WhatsApp / Telegram / Signal Chat Capture
Sturnus records the screen when messaging apps are open, giving attackers access to your:
- Chats
- Media
- Contact details
- Multi-factor authentication conversations
Encryption offers zero protection here.
4. Keystroke & UI Interaction Logging
By abusing Android Accessibility Services, it can:
- Log keystrokes
- Record taps and gestures
- Track everything happening on screen
5. Fake System Update Screen
It can display a full-screen “Android System Update” overlay while performing malicious actions in the background. Yust think the phone is updating. In reality, you’re being robbed.
6. Impossible to Remove Normally
Once the malware gets device admin privileges, you cannot:
- Uninstall it normally
- Remove it from Settings
- Remove it via ADB
You must manually revoke admin rights — something most users don’t know how to do.
How Sturnus Spreads
Currently, the malware is being distributed through malicious apps disguised as legitimate installs, including:
- Fake Chrome packages
- Fake utility apps
- Apps available outside Google Play
- Modified APKs (“cracked apps”) loaded with malware payloads
If you download anything from Telegram channels, random websites, or third-party app stores, you’re basically volunteering to get infected.

Why This Malware Exists
Sturnus is built for high-value banking fraud, especially targeting regions in:
- Southern Europe
- Central Europe
It uses region-specific overlays, meaning it’s tailored for real bank interfaces in those areas.
It’s designed with one objective:
Steal money with minimal user suspicion.
Potential Damage: Realistic, Not Hypothetical
Here’s what attackers can do if your device gets infected:
- Access your banking app
- Steal login credentials
- Read your OTPs
- Transfer funds
- Approve transactions
- Bypass device security
- Capture private chats
- Harvest stored passwords
- Monitor your entire activity
This is beyond “privacy risk.”
It’s complete financial compromise.
How to Protect Yourself Immediately
Stop expecting Google Play Protect to save you — malware like Sturnus survives because users make predictable mistakes.
Follow these non-negotiable rules:
1. Never install apps from unknown websites or APK links.
“Premium unlocked,” “modded,” or “cracked” apps are malware magnets.
2. Disable installation from Unknown Sources.
If you enabled it once, turn it off now.
3. Watch app permissions like a hawk.
Any app asking for:
- Accessibility
- Screen recording
- Device admin
- SMS access
- Notification access
should be treated as hostile unless absolutely necessary.
4. Keep banking alerts enabled.
Instant notifications can save you minutes — which often means saving your money.
5. Use strong app-level security.
Enable:
- App lock
- Biometric lock
- Two-factor authentication
6. Update your OS and apps regularly.
Outdated Android versions are playgrounds for malware operators.
Final thoughts
Sturnus isn’t just another Android nuisance — it’s a full-scale takeover tool built to bypass encryption, mimic banking apps, and quietly empty accounts while users remain clueless. Most people get infected because they assume “one APK can’t hurt” or trust every permission pop-up without thinking. That blindness is exactly what this malware exploits.
If you’re installing apps from random websites, ignoring security prompts, or giving Accessibility permissions to apps you barely know, then you’re inviting this threat into your device. The truth is simple: Android security collapses the moment you let the wrong app in.
Stay disciplined. Stick to verified sources. Question every permission. And treat your phone like the financial gateway it actually is, because malware like Sturnus is designed for one purpose: to punish careless behavior.
