Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages

Posted on November 20, 2025November 20, 2025 By CWS

A brand new Android banking trojan named Sturnus is designed to focus on communications from safe messaging purposes comparable to WhatsApp, Telegram, and Sign, in accordance with cell safety and fraud detection firm ThreatFabric.

The safety agency says Sturnus is absolutely useful, however seems to be beneath improvement. Whereas it has but to be broadly deployed, an evaluation of the malware confirmed that it’s aimed on the prospects of economic establishments in Central and Southern Europe.

As soon as it has contaminated a tool, the malware can conduct overlay assaults to show faux financial institution login screens to trick victims into handing over their credentials. As well as, Sturnus allows cybercriminals to log keystrokes and permits them to remotely management the compromised machine.

The malware is designed to achieve administrator privileges on Android telephones and displays the sufferer’s actions to detect makes an attempt to take away it from the machine.

One noteworthy functionality of Sturnus is said to the concentrating on of safe messaging purposes. In accordance with ThreatFabric researchers, the malware displays foreground apps and initiates its malicious routines when the sufferer opens Telegram, WhatsApp, or Sign.

Most of these safe messaging purposes present end-to-end encryption to guard consumer communications. Nevertheless, such a safety mechanism doesn’t cowl conditions the place the machine has been utterly compromised.

“As a result of it depends on Accessibility Service logging fairly than community interception, the malware can learn all the things that seems on display—together with contacts, full dialog threads, and the content material of incoming and outgoing messages—in actual time,” ThreatFabric defined. 

“This makes the potential notably harmful: it utterly sidesteps end-to-end encryption by accessing messages after they’re decrypted by the reputable app, giving the attacker a direct view into supposedly personal conversations,” it added.Commercial. Scroll to proceed studying.

Associated: Malware Now Makes use of AI Throughout Execution to Mutate and Gather Information, Google Warns

Associated: ClickFix Assaults In opposition to macOS Customers Evolving

Associated: Landfall Android Spy ware Focused Samsung Telephones through Zero-Day

Associated: Tens of Hundreds of Malicious NPM Packages Distribute Self-Replicating Worm

Security Week News Tags:Banking, Messages, Signal, Sturnus, Targets, Telegram, Trojan, WhatsApp

Post navigation

Previous Post: Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users
Next Post: Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image

Related Posts

Transportation Companies Hacked to Steal Cargo Security Week News
Cybercriminals Trade 183 Million Stolen Credentials on Telegram, Dark Forums Security Week News
EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules Security Week News
Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider Security Week News
ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure Security Week News
Vulnerabilities Allow Disruption of Phoenix Contact UPS Devices Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark