Close Menu
  • Cyber security
    • Malware
    • Mobile security
  • Computer Security
  • Cyber news
    • Data breaches
  • Cyber law & Compliance
  • About us
Facebook X (Twitter) Instagram Threads
Facebook X (Twitter) Instagram
Cyber infos
Join us
  • Cyber security
    • Malware
    • Mobile security
  • Computer Security
  • Cyber news
    • Data breaches
  • Cyber law & Compliance
  • About us
Cyber infos
Home » Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank
Cyber news

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

A silent Android trojan built to steal your money, your data, and your privacy.
Cyber infosBy Cyber infosNovember 24, 2025No Comments4 Mins Read
Share Facebook Twitter WhatsApp Pinterest Email LinkedIn Copy Link Threads Reddit Telegram
Follow Us
WhatsApp X (Twitter) Instagram LinkedIn Telegram
Share
WhatsApp Facebook Twitter LinkedIn Email Telegram Copy Link Pinterest Threads Reddit

The Android malware ecosystem just evolved again and not in your favor. A new banking trojan named Sturnus is circulating in the wild, and its capabilities push it far beyond the typical spyware junk you’re used to hearing about. This one can monitor encrypted chats, steal banking credentials, take full device control, and drain bank accounts without users realizing what’s happening until it’s too late.

Here’s the blunt truth: If this malware gains accessibility permissions on your phone, the attacker owns you. Full stop.

Table of Contents hide
1 What Exactly Is Sturnus?
2 Key Capabilities That Make Sturnus Extremely Dangerous
3 How Sturnus Spreads
4 Why This Malware Exists
5 Potential Damage: Realistic, Not Hypothetical
6 How to Protect Yourself Immediately
7 Final thoughts

What Exactly Is Sturnus?

Sturnus is a privately operated Android banking trojan currently being analyzed by ThreatFabric. It’s not a mass-market commodity malware — it’s a targeted tool built for financial fraud with advanced espionage capabilities.

The standout ability? It bypasses the encryption of apps like WhatsApp, Telegram, and Signal by capturing the screen after decryption, directly at the device level. End-to-end encryption becomes meaningless when malware can see what you see.

Key Capabilities That Make Sturnus Extremely Dangerous

This isn’t just another password-stealing nuisance. Sturnus combines multiple attack layers:

1. Overlay Attacks for Banking Apps

It can display pixel-perfect fake login screens on top of banking apps. You enter your details thinking it’s legitimate. The attacker gets your credentials instantly.

2. Full VNC-Style Remote Control

It sets up a WebSocket channel that lets attackers remotely interact with your phone like a virtual machine.
This means they can:

  • Navigate apps
  • Perform transactions
  • Read SMS/OTP messages
  • Approve fraudulent payments

and you may not notice anything happening.

3. WhatsApp / Telegram / Signal Chat Capture

Sturnus records the screen when messaging apps are open, giving attackers access to your:

  • Chats
  • Media
  • Contact details
  • Multi-factor authentication conversations

Encryption offers zero protection here.

4. Keystroke & UI Interaction Logging

By abusing Android Accessibility Services, it can:

  • Log keystrokes
  • Record taps and gestures
  • Track everything happening on screen

5. Fake System Update Screen

It can display a full-screen “Android System Update” overlay while performing malicious actions in the background. Yust think the phone is updating. In reality, you’re being robbed.

6. Impossible to Remove Normally

Once the malware gets device admin privileges, you cannot:

  • Uninstall it normally
  • Remove it from Settings
  • Remove it via ADB

You must manually revoke admin rights — something most users don’t know how to do.

How Sturnus Spreads

Currently, the malware is being distributed through malicious apps disguised as legitimate installs, including:

  • Fake Chrome packages
  • Fake utility apps
  • Apps available outside Google Play
  • Modified APKs (“cracked apps”) loaded with malware payloads

If you download anything from Telegram channels, random websites, or third-party app stores, you’re basically volunteering to get infected.

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

Why This Malware Exists

Sturnus is built for high-value banking fraud, especially targeting regions in:

  • Southern Europe
  • Central Europe

It uses region-specific overlays, meaning it’s tailored for real bank interfaces in those areas.

It’s designed with one objective:
Steal money with minimal user suspicion.

Potential Damage: Realistic, Not Hypothetical

Here’s what attackers can do if your device gets infected:

  • Access your banking app
  • Steal login credentials
  • Read your OTPs
  • Transfer funds
  • Approve transactions
  • Bypass device security
  • Capture private chats
  • Harvest stored passwords
  • Monitor your entire activity

This is beyond “privacy risk.”
It’s complete financial compromise.

How to Protect Yourself Immediately

Stop expecting Google Play Protect to save you — malware like Sturnus survives because users make predictable mistakes.

Follow these non-negotiable rules:

1. Never install apps from unknown websites or APK links.

“Premium unlocked,” “modded,” or “cracked” apps are malware magnets.

2. Disable installation from Unknown Sources.

If you enabled it once, turn it off now.

3. Watch app permissions like a hawk.

Any app asking for:

  • Accessibility
  • Screen recording
  • Device admin
  • SMS access
  • Notification access

should be treated as hostile unless absolutely necessary.

4. Keep banking alerts enabled.

Instant notifications can save you minutes — which often means saving your money.

5. Use strong app-level security.

Enable:

  • App lock
  • Biometric lock
  • Two-factor authentication

6. Update your OS and apps regularly.

Outdated Android versions are playgrounds for malware operators.

Final thoughts

Sturnus isn’t just another Android nuisance — it’s a full-scale takeover tool built to bypass encryption, mimic banking apps, and quietly empty accounts while users remain clueless. Most people get infected because they assume “one APK can’t hurt” or trust every permission pop-up without thinking. That blindness is exactly what this malware exploits.

If you’re installing apps from random websites, ignoring security prompts, or giving Accessibility permissions to apps you barely know, then you’re inviting this threat into your device. The truth is simple: Android security collapses the moment you let the wrong app in.

Stay disciplined. Stick to verified sources. Question every permission. And treat your phone like the financial gateway it actually is, because malware like Sturnus is designed for one purpose: to punish careless behavior.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Telegram
Share. Twitter Email WhatsApp Copy Link
Previous ArticleOWASP Smart Contract Top 10 2025: New Vulnerabilities Developers Must Know
Cyber infos
  • Website

Related Posts

Cyber news

Android Photo Frames Malware: A Hidden Threat to Your Home Network

November 15, 2025
Cyber news

Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams

November 9, 2025
Cyber news

AI Tools Promoted by Threat Actors: How Artificial Intelligence Is Fueling a New Era of Cybercrime

November 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Search
Recent post
  • Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank
  • OWASP Smart Contract Top 10 2025: New Vulnerabilities Developers Must Know
  • Cyber Insurance in 2025: Trends, Risks & How Businesses Are Adapting
  • Android Photo Frames Malware: A Hidden Threat to Your Home Network
  • Top 10 Best Autonomous Endpoint Management Tools in 2025
  • Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams
Archives
Recents

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

November 24, 2025

OWASP Smart Contract Top 10 2025: New Vulnerabilities Developers Must Know

November 23, 2025

Cyber Insurance in 2025: Trends, Risks & How Businesses Are Adapting

November 22, 2025

Android Photo Frames Malware: A Hidden Threat to Your Home Network

November 15, 2025
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
Facebook X (Twitter) Instagram Pinterest WhatsApp
  • About us
  • Contact us
  • Sitemaps
© 2025 Cyberinfos - All rights are reserved

Type above and press Enter to search. Press Esc to cancel.