New Android malware can capture private messages, researchers warn

Security researchers have uncovered a new Android banking trojan capable of intercepting messages from apps including WhatsApp, Telegram and Signal after they have been decrypted.

Dutch cybersecurity firm ThreatFabric said on Thursday it had identified the malware, dubbed Sturnus, which can steal banking credentials using highly convincing fake login screens and give attackers near-total remote control of infected devices.

Once installed, Sturnus can monitor everything displayed on a phone in real time — including contacts, full message threads and the content of encrypted chats — by accessing data after it has been decrypted by legitimate apps. It can also inject text, observe user activity, and execute transactions while displaying a black, full-screen overlay that hides the operation from the victim.

ThreatFabric said the malware appears to be in development or limited testing, but is already configured with templates targeting banks across Southern and Central Europe, suggesting preparations for a wider campaign.

While the malware is likely in its pre-deployment state, researchers said, it is also fully functional and in some aspects more advanced than established malware families.

“Although the spread remains limited at this stage, the combination of targeted geography and high-value application focus implies that the attackers are refining their tooling ahead of broader or more coordinated operations,” the company added.

Sturnus is part of a wave of newly emerging Android banking trojans. In October, researchers uncovered a separate strain, Herodotus, which mimics human behaviour to evade detection while remotely operating a device. Another trojan, Crocodilus, has been used to take full control of phones to steal funds from banking and online accounts.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

Next Post

NSO seeks to overturn WhatsApp case, saying it is ‘catastrophic’ for the spyware maker

Related Posts

ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising

The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact targets. At the same time, defenders face growing blind spots — from spoofed messages to large-scale social engineering. This week’s findings show how that shrinking margin of safety is redrawing the threat landscape. Here’s what’s
Read More

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing a critical software supply chain risk. "A leaked VSCode Marketplace or Open VSX PAT [personal access token] allows an attacker to directly distribute a malicious extension update across the entire install base,"
Read More

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access
Read More