A closer look at the Tria stealer campaign
Jan. 30, 2025, 4:03 p.m.
Description
A malicious Android campaign named Tria Stealer has been targeting users in Malaysia and Brunei since mid-2024. The campaign uses wedding invitation lures to trick victims into installing a malicious app that collects SMS data, tracks call logs, and steals messages from apps like WhatsApp and emails from Gmail and Outlook. The stolen data is exfiltrated to Telegram bots. The threat actor uses this information to hijack personal messaging accounts, impersonate victims to request money transfers, and compromise other online accounts. The campaign is likely operated by an Indonesian-speaking threat actor and remains active, with the malware evolving to target more personal communications data.
Tags
Date
- Created: Jan. 30, 2025, 3:51 p.m.
- Published: Jan. 30, 2025, 3:51 p.m.
- Modified: Jan. 30, 2025, 4:03 p.m.
Indicators
- c7721857e90a5c0f97c0b62c7fe06b19d1bde18a08e57127785687b5aa7c65da
- 63c971652d9313665df835836d1d36e602b7dbfef4ed21083f1adf8e4dceac74
- 43789dee64640abe2d08cb89e99b39b58bb297d8e1cea9bdc0a2aedbf7c7a46e
Attack Patterns
- Tria Stealer
Additional Informations
- Brunei Darussalam
- Malaysia