top of page

New Sturnus Banking Trojan Targets WhatsApp, Telegram, and Signal

  • Nov 21, 2025
  • 2 min read

Key Findings


  • Sturnus is a new Android banking trojan with full device-takeover capabilities

  • It targets secure messaging apps like WhatsApp, Telegram, and Signal to bypass encryption and steal sensitive data

  • Sturnus employs sophisticated techniques like HTML overlays and accessibility-based keylogging to capture on-screen content, including messages, contacts, and credentials

  • The malware enables remote control of infected devices through screen mirroring and a structured UI mapping system

  • Sturnus strengthens persistence by securing device administrator rights and monitoring system changes to evade detection


Background


Sturnus is a new and highly capable Android banking trojan that has emerged as a significant threat, particularly for users of secure messaging applications like WhatsApp, Telegram, and Signal. Discovered by the cybersecurity firm ThreatFabric, this malware is designed to bypass the end-to-end encryption used by these communication platforms and steal sensitive user data.


Bypassing Encryption


Sturnus employs two linked mechanisms to steal data from secure messaging apps: HTML overlays and accessibility-based keylogging. The malware stores phishing templates for targeted banking apps and displays them via a WebView, capturing all user input and sending it to the command-and-control server. After exfiltration, it disables the used overlay to avoid detection.


Additionally, Sturnus utilizes its Accessibility Service to log text changes, clicks, focus shifts, and full UI-tree updates, allowing operators to reconstruct user actions even when screen capture is blocked. This enables the malware to access messages, contacts, and conversation threads in real-time, effectively sidestepping end-to-end encryption.


Remote Control and Persistence


Sturnus enables full remote control of infected devices through two complementary methods: real-time screen mirroring and a fallback system that builds screenshots from Accessibility events. The malware also sends a structured map of on-screen elements, tracking user interactions without using images, which reduces bandwidth usage and avoids detection.


To strengthen its persistence, Sturnus secures Device Administrator rights, monitors unlock events, blocks attempts to revoke privileges, and prevents removal. It also profiles sensors, hardware, and networks to adapt its tactics, evade analysis, and maintain long-term control of the device.


Conclusion


Sturnus represents a sophisticated and comprehensive threat, implementing multiple attack vectors that provide attackers with near-complete control over infected devices. The combination of overlay-based credential theft, message monitoring, extensive keylogging, real-time screen streaming, remote control, and comprehensive environmental monitoring creates a dangerous threat to victims' financial security and privacy.


Sources


  • https://securityaffairs.com/184878/cyber-crime/sturnus-new-android-banking-trojan-targets-whatsapp-telegram-and-signal.html

  • https://hackread.com/eternidade-stealer-whatsapp-steal-banking-data/

  • https://www.securityweek.com/new-sturnus-banking-trojan-targets-whatsapp-telegram-signal-messages/

  • https://www.bleepingcomputer.com/news/security/multi-threat-android-malware-sturnus-steals-signal-whatsapp-messages/

  • https://x.com/olubunmifadiora/status/1991560867335319952

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page