Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users
  • Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw
  • Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)
  • Top 10 Cybersecurity Resolutions Every User Should Make in 2026
  • New Year, New Threats: Emerging Malware Families to Watch in 2026
  • Cybersecurity Weekly Report: Multiple Security Breakdowns Close Out 2025
  • WIRED Data Breach Exposes 2.3 Million Subscriber Records | Full Incident Analysis
  • Data Breaches 2025: The 10 Biggest Incidents and Lessons Learned
Thursday, January 8
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Cyber news

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

A silent Android trojan built to steal your money, your data, and your privacy.
Cyber infosBy Cyber infosNovember 24, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

The Android malware ecosystem just evolved again and not in your favor. A new banking trojan named Sturnus is circulating in the wild, and its capabilities push it far beyond the typical spyware junk you’re used to hearing about. This one can monitor encrypted chats, steal banking credentials, take full device control, and drain bank accounts without users realizing what’s happening until it’s too late.

Here’s the blunt truth: If this malware gains accessibility permissions on your phone, the attacker owns you. Full stop.

Table of Contents hide
1 What Exactly Is Sturnus?
2 Key Capabilities That Make Sturnus Extremely Dangerous
3 How Sturnus Spreads
4 Why This Malware Exists
5 Potential Damage: Realistic, Not Hypothetical
6 How to Protect Yourself Immediately
7 Final thoughts

What Exactly Is Sturnus?

Sturnus is a privately operated Android banking trojan currently being analyzed by ThreatFabric. It’s not a mass-market commodity malware — it’s a targeted tool built for financial fraud with advanced espionage capabilities.

The standout ability? It bypasses the encryption of apps like WhatsApp, Telegram, and Signal by capturing the screen after decryption, directly at the device level. End-to-end encryption becomes meaningless when malware can see what you see.

Key Capabilities That Make Sturnus Extremely Dangerous

This isn’t just another password-stealing nuisance. Sturnus combines multiple attack layers:

1. Overlay Attacks for Banking Apps

It can display pixel-perfect fake login screens on top of banking apps. You enter your details thinking it’s legitimate. The attacker gets your credentials instantly.

2. Full VNC-Style Remote Control

It sets up a WebSocket channel that lets attackers remotely interact with your phone like a virtual machine.
This means they can:

  • Navigate apps
  • Perform transactions
  • Read SMS/OTP messages
  • Approve fraudulent payments

and you may not notice anything happening.

3. WhatsApp / Telegram / Signal Chat Capture

Sturnus records the screen when messaging apps are open, giving attackers access to your:

  • Chats
  • Media
  • Contact details
  • Multi-factor authentication conversations

Encryption offers zero protection here.

4. Keystroke & UI Interaction Logging

By abusing Android Accessibility Services, it can:

  • Log keystrokes
  • Record taps and gestures
  • Track everything happening on screen

5. Fake System Update Screen

It can display a full-screen “Android System Update” overlay while performing malicious actions in the background. Yust think the phone is updating. In reality, you’re being robbed.

6. Impossible to Remove Normally

Once the malware gets device admin privileges, you cannot:

  • Uninstall it normally
  • Remove it from Settings
  • Remove it via ADB

You must manually revoke admin rights — something most users don’t know how to do.

How Sturnus Spreads

Currently, the malware is being distributed through malicious apps disguised as legitimate installs, including:

  • Fake Chrome packages
  • Fake utility apps
  • Apps available outside Google Play
  • Modified APKs (“cracked apps”) loaded with malware payloads

If you download anything from Telegram channels, random websites, or third-party app stores, you’re basically volunteering to get infected.

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

Why This Malware Exists

Sturnus is built for high-value banking fraud, especially targeting regions in:

  • Southern Europe
  • Central Europe

It uses region-specific overlays, meaning it’s tailored for real bank interfaces in those areas.

It’s designed with one objective:
Steal money with minimal user suspicion.

Potential Damage: Realistic, Not Hypothetical

Here’s what attackers can do if your device gets infected:

  • Access your banking app
  • Steal login credentials
  • Read your OTPs
  • Transfer funds
  • Approve transactions
  • Bypass device security
  • Capture private chats
  • Harvest stored passwords
  • Monitor your entire activity

This is beyond “privacy risk.”
It’s complete financial compromise.

How to Protect Yourself Immediately

Stop expecting Google Play Protect to save you — malware like Sturnus survives because users make predictable mistakes.

Follow these non-negotiable rules:

1. Never install apps from unknown websites or APK links.

“Premium unlocked,” “modded,” or “cracked” apps are malware magnets.

2. Disable installation from Unknown Sources.

If you enabled it once, turn it off now.

3. Watch app permissions like a hawk.

Any app asking for:

  • Accessibility
  • Screen recording
  • Device admin
  • SMS access
  • Notification access

should be treated as hostile unless absolutely necessary.

4. Keep banking alerts enabled.

Instant notifications can save you minutes — which often means saving your money.

5. Use strong app-level security.

Enable:

  • App lock
  • Biometric lock
  • Two-factor authentication

6. Update your OS and apps regularly.

Outdated Android versions are playgrounds for malware operators.

Final thoughts

Sturnus isn’t just another Android nuisance — it’s a full-scale takeover tool built to bypass encryption, mimic banking apps, and quietly empty accounts while users remain clueless. Most people get infected because they assume “one APK can’t hurt” or trust every permission pop-up without thinking. That blindness is exactly what this malware exploits.

If you’re installing apps from random websites, ignoring security prompts, or giving Accessibility permissions to apps you barely know, then you’re inviting this threat into your device. The truth is simple: Android security collapses the moment you let the wrong app in.

Stay disciplined. Stick to verified sources. Question every permission. And treat your phone like the financial gateway it actually is, because malware like Sturnus is designed for one purpose: to punish careless behavior.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleOWASP Smart Contract Top 10 2025: New Vulnerabilities Developers Must Know
Next Article What Every Business Owner Must Know Before Buying Cyber Insurance in 2026
Cyber infos
  • Website

Related Posts

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

January 7, 2026
Read More

Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw

January 6, 2026
Read More

Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)

January 3, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

January 7, 2026

Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw

January 6, 2026

Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)

January 3, 2026

Google Ends Dark Web Scanning in 2026 – How to Protect Your Data Now

December 17, 2025

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

January 7, 2026

Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw

January 6, 2026

Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)

January 3, 2026

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

New Year, New Threats: Emerging Malware Families to Watch in 2026

December 31, 2025
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.