Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Prince Andrew’s advisor encouraged Jeffrey Epstein to invest in EV startups like Lucid Motors

AI agents could become lawyers after all

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Sturnus Android Trojan silently captures encrypted chats and hijacks devices
Identity

New Sturnus Android Trojan silently captures encrypted chats and hijacks devices

userBy userNovember 20, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 20, 2025Ravi LakshmananMalware/Mobile Security

Cybersecurity researchers have revealed details of a new Android banking Trojan called Sturnus that can steal credentials and take over entire devices to perform financial fraud.

“A key differentiator is the ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption, Sturnus can monitor communications via WhatsApp, Telegram, and Signal.”

Another notable feature is the ability to perform overlay attacks in stages by providing a fake login screen on a banking app to capture the victim’s credentials. According to the Dutch mobile security company, Sturnus is privately operated and currently rated as being in the evaluation stage. Artifacts that distribute banking malware include:

Google Chrome (“com.klivkfbky.izaybebnx”) Preemix Box (“com.uvxuthoq.noscjahae”)

DFIR retainer service

The malware is designed to specifically identify financial institutions in Southern and Central Europe using region-specific overlays.

The name Sturnus pays homage to its use of a mixed communication pattern that combines plaintext, AES, and RSA, which ThreatFabric likens to the European starling (Sturnus vulgaris), which is known to incorporate various whistles to imitate its voice.

Once launched, the Trojan connects to a remote server via WebSocket and HTTP channels, registers the device, and receives an encrypted payload. It also establishes a WebSocket channel to allow threat actors to interact with compromised Android devices during virtual network computing (VNC) sessions.

In addition to providing a fake overlay for banking apps, Sturnus can also exploit Android’s accessibility services to capture keystrokes and record user interface (UI) interactions. As soon as the banking overlay is provided to the victim and the credentials are collected, the overlay for that particular target is disabled to avoid arousing user suspicion.

In addition, it can block all visual feedback and display a full-screen overlay that mimics the Android operating system update screen, giving the user the impression that a software update is in progress, when in fact malicious actions may be performed in the background.

Other features of the malware include support for device activity monitoring, the ability to leverage accessibility services to collect chat content from Signal, Telegram, and WhatsApp, and send details about all interface elements visible on the screen.

This allows the attacker to finally rebuild the layout and remotely issue actions related to clicks, text input, scrolling, app launches, permission checks, or enable black screen overlays. An alternative remote control mechanism built into Sturnus uses the system’s display capture framework to mirror the device’s screen in real time.

“When a user navigates to a settings screen that could potentially disable administrator status, the malware detects the attempt through accessibility monitoring, identifies the relevant controls, and automatically navigates away from the page to disturb the user,” ThreatFabric said.

CIS build kit

“The malware is strongly protected against cleanup attempts, as both normal uninstallation and removal by tools such as ADB are blocked until administrative privileges are manually revoked.”

Extensive environmental monitoring capabilities allow you to collect sensor information, network status, hardware data, and installed app inventory. This device profile acts as a continuous feedback loop, helping attackers adapt their tactics and evade detection.

“While proliferation remains limited at this stage, the combination of targeted geographies and high-value application focus suggests threat actors are refining their tools ahead of broader or more coordinated operations,” ThreatFabric said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article‘Bonobo forests have never been so quiet’: Most extreme incident of violence in ‘hippie’ species recorded, with females ganging up on males in unprecedented attack
Next Article CTM360 exposes global WhatsApp hijacking campaign: HackOnChat
user
  • Website

Related Posts

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Prince Andrew’s advisor encouraged Jeffrey Epstein to invest in EV startups like Lucid Motors

AI agents could become lawyers after all

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.