Crypto-Stealing Malware Poses Threat to Web3 Professionals

A new malware campaign named 'Meeten' targets Web3 professionals by masquerading as a video conferencing app, stealing sensitive data including cryptocurrency assets.

Cybercriminals are increasingly targeting Web3 professionals with a sophisticated malware campaign disguised as a video conferencing application. This malware, known as "Meeten," has been active since September 2024 and is designed to steal sensitive information, including cryptocurrency assets and banking details, from both Windows and macOS users.

Key Takeaways

  • Target Audience: Web3 professionals are the primary targets of this malware campaign.
  • Malware Functionality: The malware masquerades as a legitimate meeting app, tricking users into downloading it.
  • Data Theft: It steals a wide range of sensitive information, including cryptocurrency wallet credentials and banking details.
  • Social Engineering: Attackers use social engineering tactics to build trust with potential victims before executing the scam.

Overview of the Malware Campaign

The campaign, dubbed "Meeten," utilizes fake business meetings to lure victims into downloading malicious software. Cybercriminals have created fraudulent websites and social media accounts that appear legitimate, often populated with AI-generated content to enhance their credibility.

Victims are typically contacted through platforms like Telegram, where attackers impersonate known contacts to discuss business opportunities. Once trust is established, victims are directed to the Meeten website to download the supposed meeting application, which is actually a data-stealing malware known as Realst.

How the Malware Operates

The Meeten malware operates on both Windows and macOS systems, employing different methods to execute its malicious activities:

  1. MacOS Version:
  2. Windows Version:

Types of Data Targeted

The malware is designed to extract a variety of sensitive information, including:

  • Telegram Credentials
  • Banking Card Details
  • Browser Cookies and Autofill Credentials from popular browsers like Chrome, Opera, and Edge
  • Cryptocurrency Wallet Information from Ledger, Trezor, Phantom, and Binance wallets

Recommendations for Users

To protect against such sophisticated attacks, users, especially those in the Web3 space, should adhere to the following guidelines:

  • Verify Software Legitimacy: Always confirm the authenticity of software before installation, especially if recommended through social media.
  • Use Antivirus Tools: Scan any downloaded software with multi-engine antivirus tools like VirusTotal.
  • Be Cautious with Links: Avoid clicking on links from unknown sources or unsolicited messages.

Conclusion

As cyber threats continue to evolve, Web3 professionals must remain vigilant against sophisticated malware campaigns like Meeten. By understanding the tactics employed by cybercriminals and taking proactive measures, users can better protect their sensitive information and cryptocurrency assets from theft.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

ERC-721 Fake Collection Detector: Signals
4.1.2026
[ Featured ]

ERC-721 Fake Collection Detector: Signals

Detect ERC-721 fake collection signals with our advanced detector. Analyze contract violations, transaction patterns, and code obfuscation for robust security.
Read article
ERC-1155 Scam Detection: Airdrops and Spenders
4.1.2026
[ Featured ]

ERC-1155 Scam Detection: Airdrops and Spenders

Learn about ERC-1155 scam detection, including airdrop scams, spender behavior analysis, and proactive defense strategies against evolving crypto threats.
Read article
Gnosis Safe Module Analysis: Risks and Visibility
3.1.2026
[ Featured ]

Gnosis Safe Module Analysis: Risks and Visibility

Explore Gnosis Safe module analysis: Understand key risks, visibility challenges, and effective mitigation strategies for enhanced DeFi security.
Read article