By
Gigabit Systems
February 17, 2026
•
20 min read

The assumption most teams get wrong
If your team uses WhatsApp for work conversations, this should make you pause.
Security researchers have identified a new Android malware strain called Sturnus that does something many people assume is impossible:
it can read messages from end-to-end encrypted apps in real time.
That includes WhatsApp, Signal, and Telegram.
Not by breaking encryption.
By waiting until the message is already decrypted on the screen.
Think of it like someone standing behind you, reading over your shoulder—except it’s software.
What Sturnus actually does
Sturnus is classified as a banking trojan, but its capabilities go far beyond stealing credentials.
Once installed on an Android device (usually via fake Chrome updates or system apps), it can:
Read everything displayed on the screen
Capture messages, contacts, typed text, and conversations
Steal banking details using fake overlay screens
Monitor which apps are opened and when
Take live remote control of the device
Tap buttons, approve MFA prompts, and transfer money
Hide activity behind fake “system update” screens
Block attempts to uninstall it
Researchers note that while Sturnus is still being tested, its architecture is “ready to scale”—meaning it could rapidly evolve into a widespread campaign.
Why encryption doesn’t save you here
This is the uncomfortable truth most people miss:
📌 End-to-end encryption only protects data in transit
📌 It does not protect you from malware on the device itself
📌 If the phone is compromised, every app on it is compromised
Once a message is decrypted for you to read, malware with screen access can read it too.
Encryption did its job.
The device failed.
Why this is a business problem, not a consumer one
Consumer messaging apps were never designed for regulated or sensitive business use.
They lack:
Centralized admin control
Visibility into conversations
Device compliance enforcement
Legal hold and retention
Auditing and access policies
This is why mixing personal apps with business communication is so dangerous.
If an employee’s phone is compromised, attackers don’t just get memes and family chats—they get:
Customer data
Financial discussions
Internal planning
Credentials and MFA approvals
That’s not hypothetical risk. It’s operational exposure.
What businesses should be using instead
Business platforms like Microsoft Teams or managed business email aren’t perfect—but they offer things WhatsApp never will:
Admin oversight
Access controls
Conditional access
Compliance and retention policies
Secure device management
They assume endpoints will eventually fail—and plan for it.
WhatsApp doesn’t.
The real takeaway
Malware like Sturnus turns convenience into liability.
If your team is still using WhatsApp, Telegram, or Signal for business communication—even “just temporarily”—you’re relying on personal devices and consumer apps to protect professional data.
That’s not a security strategy.
It’s a blind spot.
And the most important question isn’t whether you’ve told staff not to use WhatsApp for work.
It’s whether they’re still doing it anyway.
70% of all cyber attacks target small businesses, I can help protect yours.
#cybersecurity #managedIT #SMBrisk #dataprotection #mobilesecurity