Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals' Data

December 7, 2024 at 03:57AM

Cybersecurity researchers have identified a scam campaign using fake video conferencing apps to distribute the Realst info stealer, targeting Web3 professionals. Operatives create fraudulent companies using AI to enhance legitimacy, tricking victims into downloading malware disguised as meeting software, ultimately aiming to steal sensitive data, including cryptocurrency information.

### Meeting Takeaways – Malware / Web3 Security – December 7, 2024

1. **New Scam Campaign – Realst:**
– A scam campaign known as “Meeten” has emerged, using fake video conferencing apps to deliver malware called Realst, targeting individuals in the Web3 space.

2. **Attack Methodology:**
– Attackers create fake companies augmented by AI to enhance credibility and reach out via Telegram to set up video calls.
– Victims are directed to download a malicious application labeled as a meeting tool.

3. **Malware Functionality:**
– The malware functions as an information stealer, targeting sensitive data such as cryptocurrency wallet information, Telegram credentials, banking details, and browser cookies.
– Specifics of the installations:
– **macOS Users:** Encounter false compatibility messages prompting them to enter system passwords.
– **Windows Users:** Utilize a signed installer that fetches the malicious executable from a controlled domain.

4. **Trends and Context:**
– AI is increasingly employed by cybercriminals to create realistic content and websites, complicating detection of these scams.
– Previous incidents involving fake meeting software have been reported, indicating a persistent pattern in malware delivery methods.

5. **Related Developments:**
– Recent malware variants and campaigns have emerged, including Banshee Stealer’s shutdown and new threats like Fickle, Wish, Hexon, and Celestial Stealer.
– Kaspersky highlighted a specific interest of attackers in Russian-speaking entrepreneurs using automated business software.

6. **Recommendation:**
– Vigilance is urged for potential targets, especially within the cryptocurrency and Web3 sectors, to heighten awareness of these tactics.

For further updates and insights, please follow us on Twitter and LinkedIn.

Full Article