🔴 HIGHintel

Sturnus Android Malware Steals Banking Data and Encrypted Chats

The newly discovered Sturnus Android banking malware is a privately operated threat that combines classic overlay fraud with advanced accessibility abuse to capture banking credentials and read encrypted messaging app content. Identified by ThreatFabric, Sturnus abuses Android’s Accessibility Service to monitor screen content and keystrokes in apps such as WhatsApp, Telegram, and Signal, sidestepping end-to-end encryption by harvesting decrypted messages directly from the device display. Its capabilities align with MITRE ATT&CK T1059 (Command and Scripting Interpreter) for scriptable control, T1056 (Input Capture) for keylogging, and T1114 (Email and Messaging Collection) when targeting communications data. Sturnus is distributed through social-engineering campaigns that include phishing emails, smishing (malicious SMS) and dropper applications masquerading as legitimate APKs, requiring users to sideload the malware. Once installed, it requests Accessibility and Device Administrator rights, using those to deploy HTML overlay screens that perfectly mimic target banking apps and to implement a comprehensive keylogging pipeline. The malware can display a full-screen black overlay while it executes fraudulent transactions in the background, hide uninstallation attempts by intercepting user gestures in system settings, and remotely receive commands from its operators to perform actions on behalf of the victim. ThreatFabric’s analysis indicates Sturnus is in an early testing phase but already fully functional, with configuration data showing a focus on financial institutions across Southern and Central Europe. Beyond traditional credential theft, Sturnus’ ability to harvest content from encrypted messaging platforms poses a significant risk to organizations where Signal and Telegram are used for sensitive communications. Its communication with command-and-control infrastructure uses a mix of plaintext, RSA and AES-encrypted channels designed to blend into normal network patterns and resist reverse engineering, complicating detection by signature-based mobile security tools. Defenders should treat Sturnus as a high-priority emerging threat, particularly for financial services providers and enterprises with mobile-first workflows. Mitigation steps include enforcing mobile device management (MDM) policies that block sideloaded APKs, restricting Accessibility permissions to vetted apps only, and deploying mobile threat defense (MTD) solutions capable of detecting overlay behavior and abuse of Device Administrator privileges. Security teams should also update customer and employee awareness materials to highlight the dangers of installing apps from links in SMS or email and encourage verification of unexpected banking login prompts and overlays.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: Sturnus significantly elevates risk for banks and enterprises by combining credential theft, fraudulent transaction automation, and interception of encrypted communications across WhatsApp, Telegram and Signal. Compromised devices can enable full account takeover, unauthorized wire transfers, and leakage of confidential business conversations that may contain deal information, intellectual property or regulated data. Technical Context: The malware abuses Android Accessibility and Device Administrator rights to implement HTML overlays, keylogging and real-time screen scraping, mapping to MITRE T1056 and T1114. Its resilient C2 channel uses mixed encryption schemes and remote-control commands to execute actions while hiding behind a black screen overlay. Distribution via phishing, smishing and malicious droppers reinforces the need for strong mobile app vetting and behavioral detection on endpoints.

Strategic Intelligence Guidance

  • Financial institutions should update fraud-detection models to incorporate unusual mobile session behavior and enable strong step-up authentication, especially for high-risk transfers initiated from new or untrusted Android devices.
  • Adopt enterprise MDM and MTD solutions that can enforce disallowing sideloaded APKs, monitor for suspicious Accessibility usage and detect overlay windows impersonating banking or messaging apps.
  • Run targeted awareness campaigns warning customers and staff about Android banking malware, emphasizing that legitimate institutions do not send APKs via SMS or ask users to enable Accessibility for unrelated apps.
  • Review and tighten policies around the use of consumer messaging apps for sensitive business discussions, and consider providing hardened, managed messaging clients for high-risk roles and executives.

Vendors

Google AndroidThreatFabric

Threats

Sturnus Android banking malwareAccessibility abuseOverlay fraud

Targets

Mobile banking customersFinancial institutions in EuropeEnterprises using encrypted messaging apps