top of page

How Sturnus Android Trojan Steals Your Encrypted Chats and Hijacks Your Device

  • Nov 20, 2025
  • 2 min read

Key Findings


  • New Android banking trojan called Sturnus enables credential theft and full device takeover for financial fraud

  • Key differentiator is ability to bypass encrypted messaging on apps like WhatsApp, Telegram, and Signal

  • Captures content directly from device screen after decryption, allowing monitoring of private communications

  • Stages overlay attacks to steal banking credentials and leverages accessibility services for extensive device control

  • Blocks uninstallation attempts and maintains persistent administrative rights on infected devices

  • Tailored for targeted attacks against financial institutions in Southern and Central Europe


Background


Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. This malware stands out for its ability to bypass encrypted messaging apps, allowing the attackers to monitor supposedly private communications.


Bypassing Encrypted Messaging


A key feature of Sturnus is its capability to bypass the encryption used by popular messaging apps like WhatsApp, Telegram, and Signal. Instead of attempting to break the network encryption, the trojan leverages the Android Accessibility Service to capture screen content after the legitimate app has decrypted it for the user. This gives the attacker a direct, real-time view into private conversations, contacts, and message content.


Overlay Attacks and Device Takeover


Sturnus is also designed for comprehensive fraud. It can harvest banking credentials using convincing fake login screens, known as "overlay attacks". The malware also grants attackers extensive remote control over the infected device, allowing them to observe all user activity and even "black out the device screen while executing fraudulent transactions in the background—without the victim's knowledge".


Persistence and Evasion


The trojan ensures its persistence by abusing Android Device Administrator privileges. It actively monitors when a user attempts to disable its status and automatically navigates away to block the removal attempt. Additionally, its command-and-control connection uses a complex mix of protocols and strong encryption, enabling real-time control and dynamic adaptation of tactics.


Targeted Approach


Sturnus is specifically configured to target financial institutions across Southern and Central Europe. This suggests the attackers are refining their tooling ahead of a broader or more coordinated campaign in the region.


Sources


  • https://thehackernews.com/2025/11/new-sturnus-android-trojan-quietly.html

  • https://securityonline.info/sturnus-trojan-bypasses-whatsapp-signal-encryption-takes-over-android-devices/

  • https://x.com/shah_sheikh/status/1991476928251884004

  • https://radar.offseq.com/threat/new-sturnus-android-trojan-quietly-captures-encryp-4fcb76b0

  • https://www.youtube.com/watch?v=UBo1Klq-Ung

  • https://www.reddit.com/r/pwnhub/comments/1p26kin/new_sturnus_android_trojan_steals_credentials_and/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page