How fake party invitations are being used to install remote access tools