A sophisticated Android malware campaign, dubbed Tria Stealer, has been targeting users in Malaysia and Brunei since mid-2024.
The malware uses fake wedding invitations as a lure to trick victims into installing a malicious Android Package Kit (APK).
Once installed, the malware steals sensitive data, including WhatsApp messages, SMS, and emails, and exploits this information for account hijacking and financial fraud.
Kaspersky reports that the attackers distribute the malicious APK through personal and group chats on platforms like WhatsApp and Telegram.
Victims receive messages claiming to be wedding invitations, often accompanied by an attachment labeled as a digital invitation card. However, the attachment is a disguised APK file. Once downloaded and installed, the malware gains access to the victim’s device.
Upon first execution, the app uses the IntroActivity function to check if it is being launched for the first time. It requests permissions such as android.permission.RECEIVE_SMS to intercept SMS messages.
To appear legitimate, it mimics a system settings app with a gear icon. Victims are then prompted to enter their phone number, which is sent to a command-and-control (C2) server via Telegram’s API.
The campaign has evolved since its inception in March 2024. A second version of the malware was detected in August 2024 with enhanced features, including improved wording in its Telegram communications and additional capabilities for stealing app notifications.
Researchers believe the campaign is operated by an Indonesian-speaking threat actor based on embedded Indonesian-language strings in the malware code (e.g., “APLIKASI DI BUKA LAGI,” meaning “APPLICATION REOPENED”).
While similar campaigns like UdangaSteal have targeted users in Southeast Asia before, Tria Stealer employs distinct tactics and code patterns.
The malware is highly invasive and sophisticated. Key features include:
Victims face significant risks:
The Tria Stealer campaign highlights how cybercriminals exploit social engineering tactics like fake wedding invitations to infiltrate devices.
With its ability to hijack WhatsApp accounts and steal sensitive data, this malware poses a severe threat to users in Malaysia and Brunei. As digital scams become more sophisticated, vigilance remains critical in preventing such attacks.
A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows…
Amazon Web Services Simple Notification Service (AWS SNS) has emerged as a new vector for…
Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated…
The rise of remote work has significantly increased the attack surface for cybercriminals, making robust…
A new, surprisingly simple method called Context Compliance Attack (CCA) has proven effective at bypassing…
A Russian-speaking actor using the Telegram handle @ExploitWhispers leaked internal chat logs of Black Basta…