Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » Hackers using fake video apps to target Web3 Professionals data
Cybersecurity

Hackers using fake video apps to target Web3 Professionals data

InfovistarBy InfovistarDecember 8, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Cybersecurity researchers have uncovered a new threat targeting Web3 professionals. Hackers use fake video apps (video conferencing apps) to steal sensitive information. This malware, called Realst, poses as legitimate software for business meetings.

The attackers create fake companies to trick professionals. These fake companies appear legitimate by using AI-generated content for websites, emails, and branding. Hackers contact potential victims and invite them to business meetings. They convince their targets to download a fake app from a fraudulent website.

The Meeten Campaign and Its Fake Websites

The security firm Cado Security has named this scam campaign “Meeten.” Hackers use fake website names such as Meeten, Meetone, Cuesee, and Meetio. The websites host fake apps for both Windows and macOS users.

Hackers first approach victims on Telegram. They discuss fake investment opportunities to gain the victim’s trust. Victims are then invited to a video call on the fake app.

Once victims download and install the app, the malware gets activated. This malware can access sensitive data, including cryptocurrency wallets and personal information.

The Danger for macOS Users

On macOS, the app asks for the system password. Hackers claim the app is incompatible without this password. When the user provides the password, the malware gains full access to the system.

Hackers use osascript, which is popular among many macOS malware families. Examples include Atomic macOS Stealer and Banshee Stealer. This technique allows the malware to steal sensitive data.

What the Malware Steals

Realst malware is designed to steal critical information from victims. It can access cryptocurrency wallets, banking information, Telegram credentials, and iCloud Keychain data. The malware also collects cookies from popular browsers like Chrome, Edge, Brave, and Opera. The stolen data is sent to remote servers controlled by hackers.

Windows Users Also At Risk

The Windows version of the fake app uses a signed installer file. Hackers likely use stolen certificates to make the app appear genuine.

When installed, the app downloads a malicious file from hacker-controlled servers. This file is written in Rust and steals user data. The malware then exports this data to the attackers.

AI Is Helping Hackers for Fake Video Apps

Hackers now use AI tools to create realistic websites and emails. AI-generated content makes these scams look legitimate. This increases the chances of victims falling for the fake apps. Cybersecurity researchers warn that AI makes detecting suspicious websites harder.

Also read | DroidBot Android Trojan Targeting Banks and Cryptocurrency Exchanges

Similar Attacks in the Past

This is not the first time hackers have used fake meeting apps for scams. In March, Jamf Threat Labs reported a fake website called meethub[.]gg. This site spreads malware similar to Realst.

In June, another campaign targeted cryptocurrency users with fake virtual meeting apps. This attack used malware like Rhadamanthys and Stealc to steal funds.

New Fake Video Apps Malware

Cybersecurity experts are also seeing new malware families emerge. Some recent examples include Fickle Stealer, Wish Stealer, and Celestial Stealer. Hackers target users searching for pirated software or AI tools.

The RedLine Stealer and Poseidon Stealer are two examples used in such campaigns. These stealers can steal browser data and credentials.

Hackers Using Fake Video Apps to Target Web3 Professionals Data

Banshee Stealer Shuts Down

Banshee Stealer, a macOS malware, recently stopped operations after its source code leaked online. The malware was previously sold for $3,000 per month, and the leak forced hackers to shut down their distribution network.

Why Web3 Professionals Are Prime Targets

Hackers focus on Web3 professionals because of their access to cryptocurrency wallets and financial assets. These professionals also use software to automate processes, making them attractive targets.

The RedLine Stealer campaign recently targeted Russian-speaking entrepreneurs. Hackers aimed to steal valuable data from organizations in this sector.

Also read | Cybercriminals Deploy 100K+ Malware Android Apps to Steal OTP Codes

Steps to Protect Yourself from Fake Video Apps

Web3 professionals must remain cautious and avoid suspicious apps. Only download apps from trusted sources. Verify website URLs before downloading software.

Install reliable antivirus software and update your system regularly. Use strong, unique passwords for your accounts. Do not share system passwords with unknown apps or platforms. Stay vigilant when receiving unsolicited emails or messages.

Conclusion: Fake Video Apps

Hackers are evolving their tactics to exploit Web3 professionals. Fake video conferencing apps are their latest strategy. These scams use AI to appear legitimate and trick unsuspecting users.

Web3 professionals must adopt cybersecurity best practices to protect their data. Awareness and caution are key to avoiding these malicious campaigns. Stay informed and secure your digital assets.

Cybersecurity
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDroidBot Android Trojan Targeting Banks and Cryptocurrency Exchanges
Next Article Google Announces Android XR OS for XR Devices
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment

Comments are closed.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (70)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,658 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,658 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version