Saturday, May 24, 2025
Homecyber securityBeware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

The ongoing “free wedding invite” scam is one of several innovative campaigns aimed at the senior population.

Through social media chats like WhatsApp, fraudsters use deceptive tactics, most often involving fake wedding invitations.

It communicates with its victims over WhatsApp and tricking them into installing an APK that finally sends user data to a C2 server that is hosted on Telegram.

- Advertisement - Google News

 “A malicious APK pretending to be a fake wedding invite is then shared with the victim. The victims, believing the APK to contain more details about the free wedding, install the malware and end up being exploited by having their SMS data being stolen”, F-Secure, a cyber security firm shared with Cyber Security News.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities. :

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:

Free-Wedding Invite Scam Via WhatsApp

The “wedding invite” scam, in which the victim receives a wedding invitation from an unidentified individual urging them to open the attached file to obtain further information about the wedding, was a scam that circulated throughout Malaysia. 

Particularly, the “attached file” is actually an APK that infects the victim’s phone with malware.

The malware that exists is designed to steal various types of data from users’ phones, including device, build, and SMS information.

Original WhatsApp messages received as per a Facebook post

While researchers analyzed AndroidManifest.xml, there were certain risky permissions in use that enabled text message sending and reading.

Furthermore, the app does not appear in the App Launcher due to the Missing Launcher activity category. There were two broadcast recipients for the same push notification.

Observations in AndroidManifest.xml

“Once the app is installed on the phone, it stays hidden, as deduced from the MainActivity”, researchers said.

“For spyware, the reason behind hiding is to avoid detection and carry on with its objective of stealing user data as long as possible”.

As its C2 server, the malware makes use of a Telegram bot. Telegram bots are applications offered by the Telegram chat network.

It is configured to deliver real-time information and automate user interactions.

The application transfers stolen data to the Telegram bot, making it simple for a hacker to obtain information gathered on Telegram. 

Collecting Device Information

Following the exfiltration of this data to the Telegram bot, the malware opens a seemingly secure website, distracting and calming the victim into a false sense of security. 

The Safe Website

Although it seems to be a shopping website, its functionality is unrelated to the malware.

On the compromised device, the malware intercepts incoming SMS messages.

This may result in scammers gaining access to several sensitive data, such as personally identifiable information and one-time passwords, among others.

Such information can be misused in many ways, such as selling credentials that have been stolen or taking over banking sessions.

As a result, individuals should use caution when communicating digitally, especially with elders, as the environment of scam threat is always changing.

Security companies must also be knowledgeable about it to safeguard their clients.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...