Cybercriminals are using WhatsApp with APK attachments disguised as wedding invitations to launch attacks on Android smartphone users in Malaysia and Brunei.
Kaspersky's research revealed that malicious APKs were being circulated over WhatsApp.
The scam uses two versions of the same stealer malware, which Kaspersky has dubbed Tria.
The Tria malware harvests data from text and email messages, reading call logs and message logs to help attack victims' Telegram and WhatsApp accounts.
The scams have so far been limited to Malaysia and Brunei and have not targeted specific individuals.
The Tria stealer has added social engineering tactics to hide behind a gear icon, mimicking a system application to gain access to ten permissions, including access to network activity and the ability to send and read text messages.
Kaspersky advises phone users to only use official app stores and developer websites when downloading apps, to be wary of anyone they do not know contacting them through messenger apps, and never to grant apps more permissions than they need.
Kaspersky also recommends using an authenticator app to generate 2FA codes and setting up a Telegram cloud password.
In addition, users can download Kaspersky for Android to protect themselves against Tria and other potential attacks.
If Tria malware gains access to online banking accounts, it can request and intercept OTP codes needed for login.