Press ESC to close

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals' Data

Category Details
Threat Actors Threat actors leveraging AI-generated fake companies for scams; malware delivered through fake video conferencing apps.
Campaign Overview Aimed at Web3 professionals, using fake business meetings and video apps to distribute Realst infostealer.
Target Regions (Victims) Web3 professionals and cryptocurrency users, especially Russian-speaking entrepreneurs.
Methodology – Setup of fake companies and websites.
– Use of Telegram to lure targets into fake investment meetings.
– Prompts users to download malware-laced conferencing apps.
Product Targeted Web3 platforms, cryptocurrency wallets, Telegram, and business automation tools.
Malware Reference Realst infostealer; overlaps with other stealers like Atomic macOS Stealer, Cuckoo, MacStealer, Banshee Stealer, and Cthulhu Stealer.
Tools Used – AI for creating realistic website content.
– osascript technique for macOS.
– Electron app embedded in Windows installer.
Vulnerabilities Exploited – Social engineering through Telegram.
– Compromised software signatures (e.g., stolen Brys Software Ltd certificate).
TTPs – Phishing via Telegram.
– Deployment of OS-specific malware (macOS and Windows).
– Use of stolen credentials and AI-driven legitimacy for campaigns.
Attribution Campaign codenamed “Meeten” by Cado Security; overlaps with campaigns like “markopolo” and stealer families like Banshee Stealer and Atomic macOS Stealer.
Recommendations – Avoid downloading apps from unverified sources.
– Verify legitimacy of companies and meetings.
– Use up-to-date antivirus and monitoring tools to detect unusual activity.
Source TheHackersNews

Read full article: https://thehackernews.com/2024/12/hackers-using-fake-video-conferencing.html

Disclaimer: The above summary has been generated by an AI language model

Source: TheHackersNews

Published on: December 7, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *