Crypto-Stealing Malware Poses Threat to Web3 Professionals

A new malware campaign named 'Meeten' targets Web3 professionals by masquerading as a video conferencing app, stealing sensitive data including cryptocurrency assets.

Cybercriminals are increasingly targeting Web3 professionals with a sophisticated malware campaign disguised as a video conferencing application. This malware, known as "Meeten," has been active since September 2024 and is designed to steal sensitive information, including cryptocurrency assets and banking details, from both Windows and macOS users.

Key Takeaways

  • Target Audience: Web3 professionals are the primary targets of this malware campaign.
  • Malware Functionality: The malware masquerades as a legitimate meeting app, tricking users into downloading it.
  • Data Theft: It steals a wide range of sensitive information, including cryptocurrency wallet credentials and banking details.
  • Social Engineering: Attackers use social engineering tactics to build trust with potential victims before executing the scam.

Overview of the Malware Campaign

The campaign, dubbed "Meeten," utilizes fake business meetings to lure victims into downloading malicious software. Cybercriminals have created fraudulent websites and social media accounts that appear legitimate, often populated with AI-generated content to enhance their credibility.

Victims are typically contacted through platforms like Telegram, where attackers impersonate known contacts to discuss business opportunities. Once trust is established, victims are directed to the Meeten website to download the supposed meeting application, which is actually a data-stealing malware known as Realst.

How the Malware Operates

The Meeten malware operates on both Windows and macOS systems, employing different methods to execute its malicious activities:

  1. MacOS Version:
  2. Windows Version:

Types of Data Targeted

The malware is designed to extract a variety of sensitive information, including:

  • Telegram Credentials
  • Banking Card Details
  • Browser Cookies and Autofill Credentials from popular browsers like Chrome, Opera, and Edge
  • Cryptocurrency Wallet Information from Ledger, Trezor, Phantom, and Binance wallets

Recommendations for Users

To protect against such sophisticated attacks, users, especially those in the Web3 space, should adhere to the following guidelines:

  • Verify Software Legitimacy: Always confirm the authenticity of software before installation, especially if recommended through social media.
  • Use Antivirus Tools: Scan any downloaded software with multi-engine antivirus tools like VirusTotal.
  • Be Cautious with Links: Avoid clicking on links from unknown sources or unsolicited messages.

Conclusion

As cyber threats continue to evolve, Web3 professionals must remain vigilant against sophisticated malware campaigns like Meeten. By understanding the tactics employed by cybercriminals and taking proactive measures, users can better protect their sensitive information and cryptocurrency assets from theft.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

Understanding Digital Asset Insurance: Protecting Your Virtual Wealth in 2025
28.3.2025
[ Featured ]

Understanding Digital Asset Insurance: Protecting Your Virtual Wealth in 2025

Explore digital asset insurance to safeguard your virtual wealth against cyber threats and evolving risks.
Read article
Understanding Fraud Alerts: Protecting Your Credit in 2025
28.3.2025
[ Featured ]

Understanding Fraud Alerts: Protecting Your Credit in 2025

Learn how fraud alerts protect your credit and identity in 2025. Essential tips for consumers to stay secure.
Read article
Enhancing Blockchain Transaction Security: Best Practices for Safeguarding Your Assets
28.3.2025
[ Featured ]

Enhancing Blockchain Transaction Security: Best Practices for Safeguarding Your Assets

Discover best practices for blockchain transaction security to safeguard your digital assets effectively.
Read article