{"id":23769,"date":"2025-02-03T17:43:27","date_gmt":"2025-02-03T13:43:27","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23769"},"modified":"2025-02-03T17:43:27","modified_gmt":"2025-02-03T13:43:27","slug":"tria-stealer-wedding-scam","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/tria-stealer-wedding-scam\/23769\/","title":{"rendered":"Beware of stealers disguised as\u2026 wedding invitations"},"content":{"rendered":"<p>Getting married is certainly one of the most important events in anyone\u2019s life. And in many cultures, it\u2019s customary to invite hundreds of guests to the celebration \u2014 including some you barely know. Cybervillains take advantage of such traditions, using wedding invitations as bait to launch attacks on Android smartphone users.<\/p>\n<p>Here\u2019s what threat actors have come up with this time, and how to defeat it.\n<\/p>\n<h2>How weddings and APKs are linked<\/h2>\n<p>\nYou may already know about our global threat intelligence network \u2014 <a href=\"https:\/\/www.kaspersky.com\/ksn\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Network (KSN)<\/a>. In 2024, we spotted several suspicious and clearly malicious APK samples circulating in both Malaysia and Brunei. At the same time, social networks were buzzing with Android users of those same countries complaining about having their WhatsApp accounts hacked, or receiving suspicious APKs through WhatsApp or other messenger apps.<\/p>\n<p>Connecting the dots, we deduced that cybercriminals were sending Android users in Brunei and Malaysia wedding invitations in the form of an APK, which victims were urged to install on their own devices themselves. In the message, the attacker begins by apologizing for inviting the recipient to such an important event through WhatsApp rather than in person, then suggests that the user find the time and place of the celebration in the attached file \u2014 which turned out to be the same malicious APK that we found in KSN.<\/p>\n<div id=\"attachment_52962\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/02\/03173343\/tria-stealer-wedding-scam-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52962\" class=\"wp-image-52962 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/02\/03173343\/tria-stealer-wedding-scam-01-1024x783.jpg\" alt=\"Examples of wedding invitations sent by attackers in the Indonesian language\" width=\"1024\" height=\"783\"><\/a><p id=\"caption-attachment-52962\" class=\"wp-caption-text\">Examples of wedding invitations sent by attackers in the Indonesian language<\/p><\/div>\n<p>The scheme uses two versions of the same stealer (one appeared in March 2024, the other with added functionality in August), which we\u2019ve called Tria \u2014 after the name of the user who appears to be responsible for supporting or even conducting the entire campaign.\n<\/p>\n<h2>What the Tria stealer does<\/h2>\n<p>\nThe malware primarily harvests data from text and email messages, but also reads call and message logs that it later sends to the C2 server through various Telegram bots. Naturally, the attackers don\u2019t do this out of their love of reading other people\u2019s correspondence. All stolen data is used to hack victims\u2019 Telegram, WhatsApp, and other accounts, and then message their contacts asking for money. However, an even more unpleasant scenario is possible: attackers could gain access to the victim\u2019s online banking accounts by requesting and intercepting OTP codes needed for login.<\/p>\n<p>To disguise itself, the stealer employs social engineering tactics: hiding behind a gear icon, it mimics a system application to get the permissions it needs from the user. The malware needs ten permissions in total, including access to network activity and sending\/reading text messages. For details on what other permissions Tria requests and how exactly the stealer works, see the <a href=\"https:\/\/securelist.com\/tria-stealer-collects-sms-data-from-android-devices\/115295\/\" target=\"_blank\" rel=\"noopener\">full post on our Securelist blog<\/a>.<\/p>\n<p>It\u2019s known at present that the attacks were limited to users in Malaysia and Brunei, and not targeted at any specific individuals; however, the cybervillains may decide to expand their reach going forward. And when it comes to the bogus invitation that leads to installing the APK, the scope isn\u2019t limited to weddings \u2014 future attacks could exploit religious ceremonies, birthdays\u2026 you name it. So be vigilant, arm yourself with <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a>, and read our tips on how to combat this stealer and other malware for Android.\n<\/p>\n<h2>How to guard against the Tria stealer<\/h2>\n<p>\nThe simple method of distribution makes it fairly easy to protect yourself against:\n<\/p>\n<ul>\n<li>\n<strong>Never respond to strangers in messenger apps <\/strong>\u2014 especially if they ask you to download and install something. Be wary of such messages even if they come from people in your contact list.<\/li>\n<li>\n<strong>Never open APKs downloaded from untrusted sources. <\/strong>If you need to install something on your smartphone, always use official app stores (<a href=\"https:\/\/www.kaspersky.com\/blog\/necro-infects-android-users\/52201\/\" target=\"_blank\" rel=\"noopener nofollow\">though even these aren\u2019t immune to malware<\/a>) or <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-install-kaspersky-apps-from-alternative-stores\/52889\/#:~:text=how%20to%20install%20kaspersky%20apps%20from%20apk%20files\" target=\"_blank\" rel=\"noopener nofollow\">developer websites<\/a>.<\/li>\n<li>\n<strong>Install <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a><\/strong><strong>\u00a0on your smartphone<\/strong> to protect it from Tria.<\/li>\n<li>\n<strong>Don\u2019t grant apps more permissions than they need. <\/strong>Be wary of new apps that are <a href=\"https:\/\/www.kaspersky.com\/blog\/android-most-dangerous-features\/49418\/\" target=\"_blank\" rel=\"noopener nofollow\">permission-hungry<\/a>.<\/li>\n<li>\n<strong>Harden your accounts in other messenger apps and social networks.<\/strong> You can find in-depth guides to privacy settings at the <a href=\"https:\/\/privacy.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_kd-banner_ap0072&amp;utm_content=banner&amp;utm_term=gl_kdaily_organic_hwzuab72aq5ynvk\" target=\"_blank\" rel=\"noopener\">Privacy Checker<\/a><\/li>\n<\/ul>\n<p>\nAt the end of any scam-themed post, we usually recommend setting up two-factor authentication (2FA) for all applications and services where it\u2019s possible. However, in the fight against Tria, as well as many other Trojans, 2FA with OTP by text isn\u2019t much help: this malware can intercept incoming messages, extract codes from them, and even delete such messages so you never notice anything.<\/p>\n<p>As such, we advise using an authenticator app to generate 2FA codes. <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0is the perfect solution \u2014 it securely <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-password-manager-authenticator\/48841\/\" target=\"_blank\" rel=\"noopener nofollow\">generates OTPs and reliably stores passwords and confidential documents<\/a>, with the option to sync them across all your devices.<\/p>\n<p>It\u2019s worth noting that stealers are particularly fond of hijacking Telegram accounts. To avoid losing yours, we recommend setting up a Telegram cloud password this very instant, using <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0to create and store it. To find out how to configure 2FA, refer to our <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-account-hacked\/52775\/#:~:text=how%20to%20protect%20your%20telegram%20account%20from%20being%20hacked\" target=\"_blank\" rel=\"noopener nofollow\"><strong>What to do if your Telegram account is hacked<\/strong><\/a> post.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.<\/p>\n","protected":false},"author":312,"featured_media":23772,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[105,36,695,97,2813,521],"class_list":{"0":"post-23769","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-malware-2","10":"tag-scam","11":"tag-security-2","12":"tag-stealer","13":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/tria-stealer-wedding-scam\/23769\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/tria-stealer-wedding-scam\/28516\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/tria-stealer-wedding-scam\/28643\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/tria-stealer-wedding-scam\/38997\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/tria-stealer-wedding-scam\/52958\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/tria-stealer-wedding-scam\/28768\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/tria-stealer-wedding-scam\/34589\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/tria-stealer-wedding-scam\/34213\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/312"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23769"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23769\/revisions"}],"predecessor-version":[{"id":23771,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23769\/revisions\/23771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23772"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}