Thursday, January 30, 2025
HomeAndroidNew Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Published on

SIEM as a Service

Follow Us on Google News

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed “Tria Stealer,” which exploits fake wedding invitations to lure users into installing malicious apps (APK files).

Malware Campaign Overview

The campaign primarily targets users in Malaysia and Brunei, with Malaysia experiencing the most significant impact.

Analysis indicates the operation originates from an Indonesian-speaking threat actor, supported by embedded Indonesian language strings and naming conventions in the malware’s architecture.

Detected under the identifier HEUR:Trojan-Spy.AndroidOS.Agent.*, this malware has been flagged by Kaspersky’s security solutions.

Tria Stealer harvests sensitive data, including SMS messages, call logs, emails, and personal communications from apps like WhatsApp and Gmail.

The stolen data is transmitted to the attacker using Telegram bots, enabling account takeovers and fraudulent money transfer requests targeting victims’ contacts.

The campaign uses custom Telegram API bots to manage command-and-control (C2) communications.

Technical Insights into Tria Stealer Functionality

The malicious APK distribution theme revolves around enticing users with seemingly legitimate wedding invitations shared via compromised WhatsApp and Telegram accounts.

Upon installation, the malware disguises itself as a system settings app, requesting permissions to access SMS, call logs, and notifications.

During its initial execution, it gathers device information, phone numbers, and personal app-related data, transmitting them to the attacker’s Telegram bots.

Tria Stealer incorporates advanced features, including notification interception, which allows it to extract and exfiltrate messages from apps like WhatsApp, Outlook, and Gmail.

Android malware
Sending messages to the bot

This capability supports one-time password (OTP) and transaction authorization code (TAC) theft, essential for the attackers to hijack accounts linked to messaging and financial services.

Additionally, the malware monitors SMS and call activities using custom components like SMSMonitor and CallMonitor to collect message content, sender information, and call details.

Later variants of Tria Stealer enhanced their functionality, adding capabilities to intercept notifications from various apps and intercept not just SMS but also emails, personal messages, and contact information.

The attackers intelligently segregate stolen information using multiple Telegram bots for specific data sets, such as SMS or app notifications.


The campaign is designed to exploit messaging app accounts for two main objectives: propagating the malware further and impersonating users to defraud their contacts.

Victims’ stolen data may also enable access to banking services, e-commerce accounts, and other platforms reliant on SMS or email for verification.

Unlike earlier malware campaigns like UdangaSteal, which targeted similar regions, Tria Stealer showcases distinct characteristics, including more sophisticated data theft and account compromise mechanisms.

Android malware
Overview of the Tria Stealer campaign

Attribution analysis strongly suggests Indonesian origins, with malware strings and bot names pointing to this conclusion.

Victimology trends reveal no specific targeting of individuals but a broad focus on users in Malaysia and Brunei.

Evidence indicates the campaign has been active since March 2024 and continues in January 2025.

According to the Secure List, Tria Stealer’s evolving tactics signal a persistent threat to mobile users in Southeast Asia.

By leveraging social engineering and phishing techniques, attackers exploit human trust and device vulnerabilities.

Users are strongly advised to avoid installing apps from unverified sources, remain cautious of unsolicited messages, and safeguard their devices with reliable security solutions.

Cybersecurity professionals emphasize the importance of detecting and mitigating such threats early.

Organizations and individuals must remain vigilant as this campaign highlights the growing sophistication of mobile malware attacks.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...