Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

Posted on November 20, 2025November 20, 2025 By CWS

Nov 20, 2025Ravie LakshmananMalware / Cellular Safety
Cybersecurity researchers have disclosed particulars of a brand new Android banking trojan known as Sturnus that allows credential theft and full system takeover to conduct monetary fraud.
“A key differentiator is its capacity to bypass encrypted messaging,” ThreatFabric stated in a report shared with The Hacker Information. “By capturing content material instantly from the system display screen after decryption, Sturnus can monitor communications through WhatsApp, Telegram, and Sign.”
One other notable characteristic is its capacity to stage overlay assaults by serving faux login screens atop banking apps to seize victims’ credentials. In line with the Dutch cell safety firm, Sturnus is privately operated and is at the moment assessed to be within the analysis stage. Artifacts distributing the banking malware are listed beneath –

Google Chrome (“com.klivkfbky.izaybebnx”)
Preemix Field (“com.uvxuthoq.noscjahae”)

The malware has been designed to particularly single out monetary establishments throughout Southern and Central Europe with region-specific overlays.
The identify Sturnus is a nod to its use of a combined communication sample mixing plaintext, AES, and RSA, with ThreatFabric likening it to the European starling (binomial identify: Sturnus vulgaris), which includes quite a lot of whistles and is thought to be a vocal mimic.
The trojan, as soon as launched, contacts a distant server over WebSocket and HTTP channels to register the system and obtain encrypted payloads in return. It additionally establishes a WebSocket channel to permit the menace actors to work together with the compromised Android system throughout Digital Community Computing (VNC) periods.
Moreover serving faux overlays for banking apps, Sturnus can be able to abusing Android’s accessibility providers to seize keystrokes and file person interface (UI) interactions. As quickly as an overlay for a financial institution is served to the sufferer and the credentials are harvested, the overlay for that particular goal is disabled in order to not arouse the person’s suspicion.

Moreover, it might show a full-screen overlay that blocks all visible suggestions and mimics the Android working system replace display screen to provide the impression to the person that software program updates are in progress, when, in actuality, it permits malicious actions to be carried out within the background.

A few of the malware’s different options embrace assist for monitoring system exercise, in addition to leveraging accessibility providers to assemble chat contents from Sign, Telegram, and WhatsApp, in addition to ship particulars about each seen interface factor on the display screen.
This permits the attackers to reconstruct the format at their finish and remotely challenge actions associated to clicks, textual content enter, scrolling, app launches, permission confirmations, and even allow a black display screen overlay. An alternate distant management mechanism packed into Sturnus makes use of the system’s display-capture framework to reflect the system display screen in real-time.
“Each time the person navigates to settings screens that would disable its administrator standing, the malware detects the try by accessibility monitoring, identifies related controls, and mechanically navigates away from the web page to interrupt the person,” ThreatFabric stated.

“Till its administrator rights are manually revoked, each atypical uninstallation and elimination by instruments like ADB are blocked, giving the malware robust safety in opposition to cleanup makes an attempt.”
The intensive atmosphere monitoring capabilities make it attainable to gather sensor info, community circumstances, {hardware} knowledge, and a listing of put in apps. This system profile serves as a steady suggestions loop, serving to attackers adapt their ways to sidestep detection.
“Though the unfold stays restricted at this stage, the mix of focused geography and high-value software focus implies that the attackers are refining their tooling forward of broader or extra coordinated operations,” ThreatFabric stated.

The Hacker News Tags:Android, Captures, Chats, Devices, Encrypted, Hijacks, Quietly, Sturnus, Trojan

Post navigation

Previous Post: Recent 7-Zip Vulnerability Exploited in Attacks
Next Post: Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication

Related Posts

CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The Hacker News
Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon The Hacker News
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices The Hacker News
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers The Hacker News
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT The Hacker News
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
  • Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
  • Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image
  • New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
  • Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
  • Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image
  • New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News