Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages

New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages

Posted on November 20, 2025November 20, 2025 By CWS

A brand new Android banking trojan named Sturnus is designed to focus on communications from safe messaging purposes comparable to WhatsApp, Telegram, and Sign, in accordance with cell safety and fraud detection firm ThreatFabric.

The safety agency says Sturnus is absolutely useful, however seems to be beneath improvement. Whereas it has but to be broadly deployed, an evaluation of the malware confirmed that it’s aimed on the prospects of economic establishments in Central and Southern Europe.

As soon as it has contaminated a tool, the malware can conduct overlay assaults to show faux financial institution login screens to trick victims into handing over their credentials. As well as, Sturnus allows cybercriminals to log keystrokes and permits them to remotely management the compromised machine.

The malware is designed to achieve administrator privileges on Android telephones and displays the sufferer’s actions to detect makes an attempt to take away it from the machine.

One noteworthy functionality of Sturnus is said to the concentrating on of safe messaging purposes. In accordance with ThreatFabric researchers, the malware displays foreground apps and initiates its malicious routines when the sufferer opens Telegram, WhatsApp, or Sign.

Most of these safe messaging purposes present end-to-end encryption to guard consumer communications. Nevertheless, such a safety mechanism doesn’t cowl conditions the place the machine has been utterly compromised.

“As a result of it depends on Accessibility Service logging fairly than community interception, the malware can learn all the things that seems on display—together with contacts, full dialog threads, and the content material of incoming and outgoing messages—in actual time,” ThreatFabric defined. 

“This makes the potential notably harmful: it utterly sidesteps end-to-end encryption by accessing messages after they’re decrypted by the reputable app, giving the attacker a direct view into supposedly personal conversations,” it added.Commercial. Scroll to proceed studying.

Associated: Malware Now Makes use of AI Throughout Execution to Mutate and Gather Information, Google Warns

Associated: ClickFix Assaults In opposition to macOS Customers Evolving

Associated: Landfall Android Spy ware Focused Samsung Telephones through Zero-Day

Associated: Tens of Hundreds of Malicious NPM Packages Distribute Self-Replicating Worm

Security Week News Tags:Banking, Messages, Signal, Sturnus, Targets, Telegram, Trojan, WhatsApp

Post navigation

Previous Post: Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users
Next Post: Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image

Related Posts

Cisco Patches Critical Vulnerabilities in Contact Center Appliance Cisco Patches Critical Vulnerabilities in Contact Center Appliance Security Week News
Major Cybersecurity M&A Deals in January 2026 Major Cybersecurity M&A Deals in January 2026 Security Week News
Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ Security Week News
aiFWall Emerges from Stealth With an AI Firewall aiFWall Emerges from Stealth With an AI Firewall Security Week News
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Security Week News
Vulnerabilities Allow Disruption of Phoenix Contact UPS Devices Vulnerabilities Allow Disruption of Phoenix Contact UPS Devices Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News