How Cybercriminals Bypass End-to-End Encryption in WhatsApp, Signal, and Telegram: Understanding the Sturnus Banking Trojan Threat

  • November 24, 2025

Sturnus trojan

End-to-end encryption has become the gold standard for secure messaging, with platforms like WhatsApp, Signal, and Telegram offering billions of users the promise that their private conversations remain confidential. However, sophisticated cybercriminals have developed innovative techniques that circumvent encrypted messaging protections without actually breaking the underlying cryptographic protocols. The emergence of the Sturnus banking trojan demonstrates how attackers can render end-to-end encryption meaningless by targeting the weakest link in the security chain: the device itself.

This evolving threat landscape challenges fundamental assumptions about mobile security and demands urgent reassessment of how individuals and organizations protect sensitive communications in an increasingly hostile digital environment.

Understanding End-to-End Encryption and Its Limitations

End-to-end encryption represents one of the most powerful privacy technologies available today. When implemented correctly, these protocols ensure messages remain encrypted from sender to recipient, with even service providers unable to decrypt communications. WhatsApp, Signal, and Telegram have all implemented end-to-end encryption variations, with Signal pioneering the protocol now underpinning WhatsApp’s security architecture.

The mathematical strength of these encryption protocols remains essentially unbreakable with current technology. However, end-to-end encryption only protects data during transmission. Once messages arrive and get decrypted for display to recipients, they exist in plaintext on devices—creating a critical vulnerability that sophisticated attackers exploit.

The Sturnus Banking Trojan: A New Class of Mobile Malware

Security researchers at ThreatFabric recently identified Sturnus, a highly sophisticated Android banking trojan named after the common starling bird due to its complex communication patterns. While functioning primarily as a banking trojan, its most concerning capability involves systematically bypassing encrypted messaging security through clever abuse of Android’s Accessibility Service—a legitimate framework designed to help users with disabilities.

Current evidence suggests Sturnus remains in testing phases with limited deployment focused on Southern and Central Europe. However, its technical sophistication indicates significant development investment and suggests broader deployment may follow testing completion.

How Sturnus Circumvents End-to-End Encryption

The technique Sturnus employs to bypass encrypted messaging security represents a fundamentally different approach than attempting to break cryptographic protocols. Rather than attacking the encryption itself—an essentially impossible task given current technology—the malware waits patiently for legitimate applications to complete the decryption process automatically when displaying messages to users.

When victims open WhatsApp, Signal, or Telegram on infected devices, Sturnus detects the foreground application and automatically activates its screen content collection capabilities. Through abuse of Android Accessibility Service permissions, the malware can read everything visible on screen in real-time, including complete conversation threads, contact information, and both incoming and outgoing message content.

This accessibility service abuse technique proves particularly effective because it operates after the legitimate messaging application has already decrypted content for display to the user. From the victim’s perspective, everything appears completely normal—the secure padlock icons remain visible, conversations show the expected end-to-end encryption indicators, and the application interface provides no warning that communications are being intercepted.

The technical implementation relies on what security researchers call “UI tree collection”—essentially creating a complete map of all user interface elements currently displayed on screen. This capability enables Sturnus to systematically extract text from messaging applications, identify sender and recipient information, and capture the full context of conversations without any network interception that might be detected by security monitoring systems.

Because the malware accesses content directly from the user interface rather than intercepting network communications, it completely sidesteps end-to-end encryption protections. The cryptographic protocols work exactly as designed, securing data during transmission between devices. However, once legitimate applications decrypt messages for display, those protections evaporate, and malware with sufficient device access can capture everything.

Advanced Capabilities Beyond Encrypted Messaging Theft

While the ability to bypass encrypted messaging security represents Sturnus’s most headline-worthy feature, the malware possesses a comprehensive suite of capabilities that establish it as a full-featured banking trojan with extensive device takeover functionality.

Credential harvesting through sophisticated phishing overlays enables Sturnus to steal banking credentials with high success rates. The malware stores templates replicating legitimate banking application interfaces for targeted financial institutions. When victims open genuine banking apps, Sturnus overlays fake login screens that capture all credential input and transmit it to command-and-control servers. These overlays demonstrate impressive visual fidelity, making them difficult for users to distinguish from legitimate authentication interfaces.

Remote device control capabilities grant attackers extensive access to compromised devices. Operators can observe all user activity in real-time, inject text input without physical interaction, capture screenshots, and even black out device screens while executing fraudulent transactions in the background. This last capability proves particularly dangerous—victims remain completely unaware that unauthorized banking transactions are occurring on their devices while they see only blank screens.

Communication protocol sophistication distinguishes Sturnus from many contemporary mobile malware families. The trojan employs a complex mix of encryption methods for command-and-control communications, switching unpredictably between plaintext, RSA-encrypted, and AES-encrypted messages. This deliberate variability helps the malware evade detection by network security systems that rely on consistent traffic patterns for threat identification.

The technical implementation involves an initial HTTP POST request to register infected devices, receiving a UUID client identifier and RSA public key in response. Sturnus then generates a 256-bit AES key locally, encrypts it using RSA/ECB/OAEPWithSHA-1AndMGF1Padding, and transmits the encrypted key while storing the plaintext AES key on the device in Base64 format. Subsequent communications use AES/CBC/PKCS5Padding encryption with the established key, with fresh 16-byte initialization vectors generated for each message to enhance security.

Distribution Vectors and Infection Methods

While researchers continue investigating how Sturnus spreads, the malware likely employs multiple distribution vectors common to sophisticated Android trojans. Malicious applications disguised as legitimate software represent the most common distribution method, potentially appearing on third-party stores lacking security vetting. Social engineering campaigns through phishing messages or compromised websites trick users into downloading malware. Compromised legitimate applications occasionally serve as distribution vectors through supply chain attacks.

Once installed, Sturnus requests Android permissions enabling malicious functionality, particularly Accessibility Service permissions. Many users grant these without understanding their implications, especially when social engineering presents seemingly legitimate justifications.

Implications for Mobile Security and Encrypted Communications

The Sturnus trojan highlights fundamental challenges in mobile security architecture. Cryptographic protections ultimately depend on endpoint device security where data must appear in plaintext for legitimate use.

For individuals and organizations relying on encrypted messaging for sensitive communications, device security becomes equally critical to communication security—a compromised device renders encryption protections meaningless. The banking trojan functionality combined with encrypted messaging interception creates particularly dangerous scenarios enabling sophisticated fraud, corporate espionage, and social engineering leveraging stolen business intelligence.

Defensive Strategies and Protection Measures

Protecting against malware that bypasses encrypted messaging requires comprehensive mobile security strategies addressing multiple threat vectors. Organizations and individuals should implement layered defenses that reduce both infection risks and potential damage from successful compromises.

Source Verification and Application Security

Install applications exclusively from official sources like Google Play Store or Apple App Store, which implement security vetting processes that detect many malware variants. While not perfect, official app stores provide significantly better security than third-party alternatives. Configure device settings to prevent installation of applications from unknown sources unless absolutely necessary for specific legitimate purposes.

Verify application authenticity before installation by checking developer information, reading user reviews carefully for signs of suspicious behavior, and researching unfamiliar applications before trusting them with device access. Be particularly skeptical of applications requesting extensive permissions that seem unrelated to their stated functionality.

Keep software updated across all device applications and operating systems. Security updates frequently patch vulnerabilities that malware exploits for infection or privilege escalation. Enable automatic updates where possible to ensure timely protection against newly discovered threats.

Permission Management and Access Control

Review and minimize permissions granted to installed applications regularly. Android’s permission system allows granular control over application capabilities. Audit which applications have Accessibility Service access—one of the most powerful and frequently abused permissions. Legitimate applications rarely require this access; its presence should trigger careful scrutiny.

Implement mobile device management solutions in organizational contexts that enforce security policies, monitor for suspicious application installations, and provide remote wipe capabilities for lost or stolen devices. Enterprise mobility management platforms can prevent installation of high-risk applications and ensure consistent security configurations across mobile device fleets.

Enable built-in security features including Google Play Protect on Android devices, which scans applications for malicious behavior. While not infallible, these platform-integrated security features provide baseline protection against known threats.

Communication Security Best Practices

Avoid sensitive communications on mobile devices when possible, particularly for extremely confidential business, legal, or personal matters. Despite encryption, mobile devices present larger attack surfaces and more challenging security management than desktop systems with proper enterprise security controls.

Use multi-factor authentication for all accounts including messaging applications, email, banking, and business systems. While MFA cannot prevent malware from capturing already-decrypted messages on compromised devices, it prevents attackers from using stolen credentials to access accounts from other devices or locations.

Implement detection and response capabilities including mobile threat defense solutions that monitor device behavior for signs of compromise. Advanced mobile security platforms can detect suspicious Accessibility Service abuse, unusual network communication patterns, and other indicators of malware infection.

Incident Response and Recovery

Develop incident response plans specifically addressing mobile device compromise scenarios. Organizations should establish procedures for reporting suspected infections, isolating compromised devices, assessing potential data exposure, rotating credentials that may have been captured, and determining whether to wipe or attempt remediation of infected devices.

Monitor for suspicious activity across accounts and financial systems that could indicate credential theft or ongoing unauthorized access. Unusual login locations, unexpected transaction patterns, or signs that communications have been intercepted warrant immediate investigation and response.

Maintain offline backups of critical data to facilitate recovery from malware infections without paying ransoms or risking continued exposure through use of compromised devices. Regular backup procedures ensure that device wipes—often the most reliable remediation for sophisticated malware—remain viable options.

The Future of Mobile Malware and Encrypted Messaging Security

The Sturnus trojan likely previews future threat developments. As end-to-end encryption becomes ubiquitous, attackers will continue developing device compromise techniques rather than attempting to break mathematically sound encryption.

Several trends suggest evolution paths: Increased targeting of encrypted messaging as attackers recognize intelligence value in accessing supposedly secure conversations. Greater evasion sophistication as malware developers invest in bypassing mobile security solutions. Expanded surveillance capabilities beyond messaging to capture screenshots, record audio, and monitor all device activities. Potential commoditization through malware-as-a-service platforms making sophisticated capabilities accessible to less skilled criminals.

Conclusion: Rethinking Mobile Security in the Encryption Era

The emergence of malware like Sturnus that successfully bypasses encrypted messaging security without breaking encryption itself forces a fundamental rethinking of mobile security strategies. End-to-end encryption remains critically important and mathematically sound, but device security has become equally essential to protecting confidential communications.

Organizations and individuals relying on WhatsApp, Signal, Telegram, and similar platforms for sensitive communications must recognize that encryption alone provides insufficient protection. Comprehensive security requires addressing the full threat landscape including malware infection vectors, permission management, application vetting, behavioral monitoring, and incident response capabilities.

The reality that sophisticated banking trojans can systematically harvest both financial credentials and supposedly secure communications demands urgent attention to mobile security hygiene. As these threats evolve and potentially expand beyond current limited operations, the gap between perceived security and actual risk will widen unless users and organizations adapt their defensive strategies accordingly.

Mobile security can no longer be an afterthought addressed through minimal effort and basic precautions. The sophistication demonstrated by Sturnus and similar threats requires proportional investment in security controls, user education, monitoring capabilities, and response procedures. Only through comprehensive security programs that address both cryptographic protections and device security can organizations effectively defend against modern mobile threats that render encryption protections meaningless through endpoint compromise.