End-to-End Encryption Doesn’t Stop Infected Devices

By  
Gigabit Systems
February 17, 2026
20 min read
Share this post

End-to-End Encryption Doesn’t Stop Infected Devices

The assumption most teams get wrong

If your team uses WhatsApp for work conversations, this should make you pause.

Security researchers have identified a new Android malware strain called Sturnus that does something many people assume is impossible:

it can read messages from end-to-end encrypted apps in real time.

That includes WhatsApp, Signal, and Telegram.

Not by breaking encryption.

By waiting until the message is already decrypted on the screen.

Think of it like someone standing behind you, reading over your shoulder—except it’s software.

What Sturnus actually does

Sturnus is classified as a banking trojan, but its capabilities go far beyond stealing credentials.

Once installed on an Android device (usually via fake Chrome updates or system apps), it can:

  • Read everything displayed on the screen

  • Capture messages, contacts, typed text, and conversations

  • Steal banking details using fake overlay screens

  • Monitor which apps are opened and when

  • Take live remote control of the device

  • Tap buttons, approve MFA prompts, and transfer money

  • Hide activity behind fake “system update” screens

  • Block attempts to uninstall it

Researchers note that while Sturnus is still being tested, its architecture is “ready to scale”—meaning it could rapidly evolve into a widespread campaign.

Why encryption doesn’t save you here

This is the uncomfortable truth most people miss:

📌 End-to-end encryption only protects data in transit

📌 It does not protect you from malware on the device itself

📌 If the phone is compromised, every app on it is compromised

Once a message is decrypted for you to read, malware with screen access can read it too.

Encryption did its job.

The device failed.

Why this is a business problem, not a consumer one

Consumer messaging apps were never designed for regulated or sensitive business use.

They lack:

  • Centralized admin control

  • Visibility into conversations

  • Device compliance enforcement

  • Legal hold and retention

  • Auditing and access policies

This is why mixing personal apps with business communication is so dangerous.

If an employee’s phone is compromised, attackers don’t just get memes and family chats—they get:

  • Customer data

  • Financial discussions

  • Internal planning

  • Credentials and MFA approvals

That’s not hypothetical risk. It’s operational exposure.

What businesses should be using instead

Business platforms like Microsoft Teams or managed business email aren’t perfect—but they offer things WhatsApp never will:

  • Admin oversight

  • Access controls

  • Conditional access

  • Compliance and retention policies

  • Secure device management

They assume endpoints will eventually fail—and plan for it.

WhatsApp doesn’t.

The real takeaway

Malware like Sturnus turns convenience into liability.

If your team is still using WhatsApp, Telegram, or Signal for business communication—even “just temporarily”—you’re relying on personal devices and consumer apps to protect professional data.

That’s not a security strategy.

It’s a blind spot.

And the most important question isn’t whether you’ve told staff not to use WhatsApp for work.

It’s whether they’re still doing it anyway.

70% of all cyber attacks target small businesses, I can help protect yours.

#cybersecurity #managedIT #SMBrisk #dataprotection #mobilesecurity

Share this post
See some more of our most recent posts...