Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Spotify’s latest feature now lets you transfer playlists from other services

Solterra is turning America’s scrap aluminum problem into cash

0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Sturnus Android Trojan silently captures encrypted chats and hijacks devices
Identity

New Sturnus Android Trojan silently captures encrypted chats and hijacks devices

userBy userNovember 20, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 20, 2025Ravi LakshmananMalware/Mobile Security

Cybersecurity researchers have revealed details of a new Android banking Trojan called Sturnus that can steal credentials and take over entire devices to perform financial fraud.

“A key differentiator is the ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption, Sturnus can monitor communications via WhatsApp, Telegram, and Signal.”

Another notable feature is the ability to perform overlay attacks in stages by providing a fake login screen on a banking app to capture the victim’s credentials. According to the Dutch mobile security company, Sturnus is privately operated and currently rated as being in the evaluation stage. Artifacts that distribute banking malware include:

Google Chrome (“com.klivkfbky.izaybebnx”) Preemix Box (“com.uvxuthoq.noscjahae”)

DFIR retainer service

The malware is designed to specifically identify financial institutions in Southern and Central Europe using region-specific overlays.

The name Sturnus pays homage to its use of a mixed communication pattern that combines plaintext, AES, and RSA, which ThreatFabric likens to the European starling (Sturnus vulgaris), which is known to incorporate various whistles to imitate its voice.

Once launched, the Trojan connects to a remote server via WebSocket and HTTP channels, registers the device, and receives an encrypted payload. It also establishes a WebSocket channel to allow threat actors to interact with compromised Android devices during virtual network computing (VNC) sessions.

In addition to providing a fake overlay for banking apps, Sturnus can also exploit Android’s accessibility services to capture keystrokes and record user interface (UI) interactions. As soon as the banking overlay is provided to the victim and the credentials are collected, the overlay for that particular target is disabled to avoid arousing user suspicion.

In addition, it can block all visual feedback and display a full-screen overlay that mimics the Android operating system update screen, giving the user the impression that a software update is in progress, when in fact malicious actions may be performed in the background.

Other features of the malware include support for device activity monitoring, the ability to leverage accessibility services to collect chat content from Signal, Telegram, and WhatsApp, and send details about all interface elements visible on the screen.

This allows the attacker to finally rebuild the layout and remotely issue actions related to clicks, text input, scrolling, app launches, permission checks, or enable black screen overlays. An alternative remote control mechanism built into Sturnus uses the system’s display capture framework to mirror the device’s screen in real time.

“When a user navigates to a settings screen that could potentially disable administrator status, the malware detects the attempt through accessibility monitoring, identifies the relevant controls, and automatically navigates away from the page to disturb the user,” ThreatFabric said.

CIS build kit

“The malware is strongly protected against cleanup attempts, as both normal uninstallation and removal by tools such as ADB are blocked until administrative privileges are manually revoked.”

Extensive environmental monitoring capabilities allow you to collect sensor information, network status, hardware data, and installed app inventory. This device profile acts as a continuous feedback loop, helping attackers adapt their tactics and evade detection.

“While proliferation remains limited at this stage, the combination of targeted geographies and high-value application focus suggests threat actors are refining their tools ahead of broader or more coordinated operations,” ThreatFabric said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow US and UK cooperation can secure commercial fusion energy
Next Article CTM360 exposes global WhatsApp hijacking campaign: HackOnChat
user
  • Website

Related Posts

0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

November 20, 2025

CTM360 exposes global WhatsApp hijacking campaign: HackOnChat

November 20, 2025

Iran-linked hackers map ship’s AIS data days before actual attempted missile attack

November 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Spotify’s latest feature now lets you transfer playlists from other services

Solterra is turning America’s scrap aluminum problem into cash

0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

CTM360 exposes global WhatsApp hijacking campaign: HackOnChat

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.