New Android malware can capture private messages, researchers warn

Security researchers have uncovered a new Android banking trojan capable of intercepting messages from apps including WhatsApp, Telegram and Signal after they have been decrypted.

Dutch cybersecurity firm ThreatFabric said on Thursday it had identified the malware, dubbed Sturnus, which can steal banking credentials using highly convincing fake login screens and give attackers near-total remote control of infected devices.

Once installed, Sturnus can monitor everything displayed on a phone in real time — including contacts, full message threads and the content of encrypted chats — by accessing data after it has been decrypted by legitimate apps. It can also inject text, observe user activity, and execute transactions while displaying a black, full-screen overlay that hides the operation from the victim.

ThreatFabric said the malware appears to be in development or limited testing, but is already configured with templates targeting banks across Southern and Central Europe, suggesting preparations for a wider campaign.

While the malware is likely in its pre-deployment state, researchers said, it is also fully functional and in some aspects more advanced than established malware families.

“Although the spread remains limited at this stage, the combination of targeted geography and high-value application focus implies that the attackers are refining their tooling ahead of broader or more coordinated operations,” the company added.

Sturnus is part of a wave of newly emerging Android banking trojans. In October, researchers uncovered a separate strain, Herodotus, which mimics human behaviour to evade detection while remotely operating a device. Another trojan, Crocodilus, has been used to take full control of phones to steal funds from banking and online accounts.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

Next Post

NSO seeks to overturn WhatsApp case, saying it is ‘catastrophic’ for the spyware maker

Related Posts

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw impacting ASUS Live Update to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-59374 (CVSS score: 9.3), has been described as an "embedded malicious code vulnerability" introduced by means of a supply chain compromise
Read More

New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails

The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia, according to Kaspersky. The Russian cybersecurity vendor said it detected the new activity in October 2025. The origins of the threat actor are presently unknown. "While the spring cyberattacks focused on organizations, the fall campaign honed in on
Read More