Crypto-Stealing Malware Poses Threat to Web3 Professionals

A new malware campaign named 'Meeten' targets Web3 professionals by masquerading as a video conferencing app, stealing sensitive data including cryptocurrency assets.

Cybercriminals are increasingly targeting Web3 professionals with a sophisticated malware campaign disguised as a video conferencing application. This malware, known as "Meeten," has been active since September 2024 and is designed to steal sensitive information, including cryptocurrency assets and banking details, from both Windows and macOS users.

Key Takeaways

  • Target Audience: Web3 professionals are the primary targets of this malware campaign.
  • Malware Functionality: The malware masquerades as a legitimate meeting app, tricking users into downloading it.
  • Data Theft: It steals a wide range of sensitive information, including cryptocurrency wallet credentials and banking details.
  • Social Engineering: Attackers use social engineering tactics to build trust with potential victims before executing the scam.

Overview of the Malware Campaign

The campaign, dubbed "Meeten," utilizes fake business meetings to lure victims into downloading malicious software. Cybercriminals have created fraudulent websites and social media accounts that appear legitimate, often populated with AI-generated content to enhance their credibility.

Victims are typically contacted through platforms like Telegram, where attackers impersonate known contacts to discuss business opportunities. Once trust is established, victims are directed to the Meeten website to download the supposed meeting application, which is actually a data-stealing malware known as Realst.

How the Malware Operates

The Meeten malware operates on both Windows and macOS systems, employing different methods to execute its malicious activities:

  1. MacOS Version:
  2. Windows Version:

Types of Data Targeted

The malware is designed to extract a variety of sensitive information, including:

  • Telegram Credentials
  • Banking Card Details
  • Browser Cookies and Autofill Credentials from popular browsers like Chrome, Opera, and Edge
  • Cryptocurrency Wallet Information from Ledger, Trezor, Phantom, and Binance wallets

Recommendations for Users

To protect against such sophisticated attacks, users, especially those in the Web3 space, should adhere to the following guidelines:

  • Verify Software Legitimacy: Always confirm the authenticity of software before installation, especially if recommended through social media.
  • Use Antivirus Tools: Scan any downloaded software with multi-engine antivirus tools like VirusTotal.
  • Be Cautious with Links: Avoid clicking on links from unknown sources or unsolicited messages.

Conclusion

As cyber threats continue to evolve, Web3 professionals must remain vigilant against sophisticated malware campaigns like Meeten. By understanding the tactics employed by cybercriminals and taking proactive measures, users can better protect their sensitive information and cryptocurrency assets from theft.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

JavaScript SDK for Wallet Risk: Quickstart
16.12.2025
[ Featured ]

JavaScript SDK for Wallet Risk: Quickstart

Quickstart guide to the JavaScript SDK for Wallet Risk. Learn to integrate, implement checks, and leverage advanced features for robust wallet security.
Read article
Neo4j for Transaction Graphs: Modeling and Cypher
16.12.2025
[ Featured ]

Neo4j for Transaction Graphs: Modeling and Cypher

Explore Neo4j transaction graph crypto use cases, modeling, and Cypher analysis. Learn how to leverage graph algorithms for security insights and real-time processing.
Read article
Python SDK for Wallet Risk: Code Examples
16.12.2025
[ Featured ]

Python SDK for Wallet Risk: Code Examples

Explore the Python SDK for Wallet Risk with code examples. Learn to assess and manage blockchain security effectively.
Read article