Crypto-Stealing Malware Poses Threat to Web3 Professionals

A new malware campaign named 'Meeten' targets Web3 professionals by masquerading as a video conferencing app, stealing sensitive data including cryptocurrency assets.

Cybercriminals are increasingly targeting Web3 professionals with a sophisticated malware campaign disguised as a video conferencing application. This malware, known as "Meeten," has been active since September 2024 and is designed to steal sensitive information, including cryptocurrency assets and banking details, from both Windows and macOS users.

Key Takeaways

  • Target Audience: Web3 professionals are the primary targets of this malware campaign.
  • Malware Functionality: The malware masquerades as a legitimate meeting app, tricking users into downloading it.
  • Data Theft: It steals a wide range of sensitive information, including cryptocurrency wallet credentials and banking details.
  • Social Engineering: Attackers use social engineering tactics to build trust with potential victims before executing the scam.

Overview of the Malware Campaign

The campaign, dubbed "Meeten," utilizes fake business meetings to lure victims into downloading malicious software. Cybercriminals have created fraudulent websites and social media accounts that appear legitimate, often populated with AI-generated content to enhance their credibility.

Victims are typically contacted through platforms like Telegram, where attackers impersonate known contacts to discuss business opportunities. Once trust is established, victims are directed to the Meeten website to download the supposed meeting application, which is actually a data-stealing malware known as Realst.

How the Malware Operates

The Meeten malware operates on both Windows and macOS systems, employing different methods to execute its malicious activities:

  1. MacOS Version:
  2. Windows Version:

Types of Data Targeted

The malware is designed to extract a variety of sensitive information, including:

  • Telegram Credentials
  • Banking Card Details
  • Browser Cookies and Autofill Credentials from popular browsers like Chrome, Opera, and Edge
  • Cryptocurrency Wallet Information from Ledger, Trezor, Phantom, and Binance wallets

Recommendations for Users

To protect against such sophisticated attacks, users, especially those in the Web3 space, should adhere to the following guidelines:

  • Verify Software Legitimacy: Always confirm the authenticity of software before installation, especially if recommended through social media.
  • Use Antivirus Tools: Scan any downloaded software with multi-engine antivirus tools like VirusTotal.
  • Be Cautious with Links: Avoid clicking on links from unknown sources or unsolicited messages.

Conclusion

As cyber threats continue to evolve, Web3 professionals must remain vigilant against sophisticated malware campaigns like Meeten. By understanding the tactics employed by cybercriminals and taking proactive measures, users can better protect their sensitive information and cryptocurrency assets from theft.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

LP Ownership Renounced Check: What It Means
1.1.2026
[ Featured ]

LP Ownership Renounced Check: What It Means

Perform an LP ownership renounced check to understand smart contract control and identify secure projects. Learn about rug pull tactics and DeFi security.
Read article
LP Token Burn Detection: Pool Safety Checks
1.1.2026
[ Featured ]

LP Token Burn Detection: Pool Safety Checks

Learn about LP token burn detection, pool safety, and advanced techniques to secure your liquidity pools. Ensure LP token uniqueness and safety.
Read article
Liquidity Lock Verification: Locker and Term
31.12.2025
[ Featured ]

Liquidity Lock Verification: Locker and Term

Learn how to perform liquidity lock verification, understand lock durations, and explore methods and tools for secure liquidity management.
Read article