Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety
  • Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage
  • 5 Web Security Threats 2025 That Transformed Online Protection Forever
  • What Cyber Insurance Doesn’t Cover & How to Fix the Gaps
  • Top Cyber Risks Today and How Cyber Insurance Protects You in 2025
  • What Every Business Owner Must Know Before Buying Cyber Insurance in 2025
  • Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank
  • OWASP Smart Contract Top 10 2025: New Vulnerabilities Developers Must Know
Wednesday, December 10
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Cyber news

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

A silent Android trojan built to steal your money, your data, and your privacy.
Cyber infosBy Cyber infosNovember 24, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

The Android malware ecosystem just evolved again and not in your favor. A new banking trojan named Sturnus is circulating in the wild, and its capabilities push it far beyond the typical spyware junk you’re used to hearing about. This one can monitor encrypted chats, steal banking credentials, take full device control, and drain bank accounts without users realizing what’s happening until it’s too late.

Here’s the blunt truth: If this malware gains accessibility permissions on your phone, the attacker owns you. Full stop.

Table of Contents hide
1 What Exactly Is Sturnus?
2 Key Capabilities That Make Sturnus Extremely Dangerous
3 How Sturnus Spreads
4 Why This Malware Exists
5 Potential Damage: Realistic, Not Hypothetical
6 How to Protect Yourself Immediately
7 Final thoughts

What Exactly Is Sturnus?

Sturnus is a privately operated Android banking trojan currently being analyzed by ThreatFabric. It’s not a mass-market commodity malware — it’s a targeted tool built for financial fraud with advanced espionage capabilities.

The standout ability? It bypasses the encryption of apps like WhatsApp, Telegram, and Signal by capturing the screen after decryption, directly at the device level. End-to-end encryption becomes meaningless when malware can see what you see.

Key Capabilities That Make Sturnus Extremely Dangerous

This isn’t just another password-stealing nuisance. Sturnus combines multiple attack layers:

1. Overlay Attacks for Banking Apps

It can display pixel-perfect fake login screens on top of banking apps. You enter your details thinking it’s legitimate. The attacker gets your credentials instantly.

2. Full VNC-Style Remote Control

It sets up a WebSocket channel that lets attackers remotely interact with your phone like a virtual machine.
This means they can:

  • Navigate apps
  • Perform transactions
  • Read SMS/OTP messages
  • Approve fraudulent payments

and you may not notice anything happening.

3. WhatsApp / Telegram / Signal Chat Capture

Sturnus records the screen when messaging apps are open, giving attackers access to your:

  • Chats
  • Media
  • Contact details
  • Multi-factor authentication conversations

Encryption offers zero protection here.

4. Keystroke & UI Interaction Logging

By abusing Android Accessibility Services, it can:

  • Log keystrokes
  • Record taps and gestures
  • Track everything happening on screen

5. Fake System Update Screen

It can display a full-screen “Android System Update” overlay while performing malicious actions in the background. Yust think the phone is updating. In reality, you’re being robbed.

6. Impossible to Remove Normally

Once the malware gets device admin privileges, you cannot:

  • Uninstall it normally
  • Remove it from Settings
  • Remove it via ADB

You must manually revoke admin rights — something most users don’t know how to do.

How Sturnus Spreads

Currently, the malware is being distributed through malicious apps disguised as legitimate installs, including:

  • Fake Chrome packages
  • Fake utility apps
  • Apps available outside Google Play
  • Modified APKs (“cracked apps”) loaded with malware payloads

If you download anything from Telegram channels, random websites, or third-party app stores, you’re basically volunteering to get infected.

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

Why This Malware Exists

Sturnus is built for high-value banking fraud, especially targeting regions in:

  • Southern Europe
  • Central Europe

It uses region-specific overlays, meaning it’s tailored for real bank interfaces in those areas.

It’s designed with one objective:
Steal money with minimal user suspicion.

Potential Damage: Realistic, Not Hypothetical

Here’s what attackers can do if your device gets infected:

  • Access your banking app
  • Steal login credentials
  • Read your OTPs
  • Transfer funds
  • Approve transactions
  • Bypass device security
  • Capture private chats
  • Harvest stored passwords
  • Monitor your entire activity

This is beyond “privacy risk.”
It’s complete financial compromise.

How to Protect Yourself Immediately

Stop expecting Google Play Protect to save you — malware like Sturnus survives because users make predictable mistakes.

Follow these non-negotiable rules:

1. Never install apps from unknown websites or APK links.

“Premium unlocked,” “modded,” or “cracked” apps are malware magnets.

2. Disable installation from Unknown Sources.

If you enabled it once, turn it off now.

3. Watch app permissions like a hawk.

Any app asking for:

  • Accessibility
  • Screen recording
  • Device admin
  • SMS access
  • Notification access

should be treated as hostile unless absolutely necessary.

4. Keep banking alerts enabled.

Instant notifications can save you minutes — which often means saving your money.

5. Use strong app-level security.

Enable:

  • App lock
  • Biometric lock
  • Two-factor authentication

6. Update your OS and apps regularly.

Outdated Android versions are playgrounds for malware operators.

Final thoughts

Sturnus isn’t just another Android nuisance — it’s a full-scale takeover tool built to bypass encryption, mimic banking apps, and quietly empty accounts while users remain clueless. Most people get infected because they assume “one APK can’t hurt” or trust every permission pop-up without thinking. That blindness is exactly what this malware exploits.

If you’re installing apps from random websites, ignoring security prompts, or giving Accessibility permissions to apps you barely know, then you’re inviting this threat into your device. The truth is simple: Android security collapses the moment you let the wrong app in.

Stay disciplined. Stick to verified sources. Question every permission. And treat your phone like the financial gateway it actually is, because malware like Sturnus is designed for one purpose: to punish careless behavior.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleOWASP Smart Contract Top 10 2025: New Vulnerabilities Developers Must Know
Next Article What Every Business Owner Must Know Before Buying Cyber Insurance in 2025
Cyber infos
  • Website

Related Posts

India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety

December 7, 2025
Read More

Android Photo Frames Malware: A Hidden Threat to Your Home Network

November 15, 2025
Read More

Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams

November 9, 2025
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety

December 7, 2025

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

November 24, 2025

Android Photo Frames Malware: A Hidden Threat to Your Home Network

November 15, 2025

Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams

November 9, 2025

Top 10

Top 10 Best Autonomous Endpoint Management Tools in 2025

November 14, 2025

mobile security

How to Prevent SIM Swap Attacks and Protect Your Mobile Number

February 23, 2025

How to Recover Lost Data from a Compromised Smartphone – Complete Guide

February 22, 2025

Are AI-Generated Passwords More Secure than Human-Created Ones?

February 13, 2025

Selling Your Phone? Follow This Guide to Ensure Your Data is 100% Gone!

February 9, 2025
Archives
Cyber Insurance

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2025

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2025

November 26, 2025

Cyber Insurance in 2025: Trends, Risks & How Businesses Are Adapting

November 22, 2025
Recents

India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety

December 7, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

5 Web Security Threats 2025 That Transformed Online Protection Forever

December 5, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2025

November 28, 2025
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2025 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.