Meeten Malware Targets macOS and Windows to Steal Logins

Meeten Malware Targets macOS and Windows to Steal Logins

Realst malware targets Web3 professionals using fake companies like “Meetio” with AI-generated content. Victims are lured into downloading malicious meeting apps during fake video calls.

Meeten Malware

Realst is a sophisticated crypto-stealing malware that has been targeting Web3 professionals for the past four months. Once the malware is installed, it steals sensitive information such as cryptocurrency wallet credentials and private keys.

Webpage – meeten

The malware’s creators have employed advanced tactics, including the use of AI-generated content to create fake companies, like “Meetio,” to appear legitimate. By tricking victims into participating in video calls, cybercriminals convince them to download a malicious meeting application from compromised websites. This ongoing campaign highlights the increasing complexity of cyber threats within the Web3 space, posing significant risks to users involved in cryptocurrency and blockchain technology.

The threat actor, known by aliases like Meeten, Clusee, and Meetio, uses advanced social engineering tactics to trick victims into downloading malicious software. They create convincing fake company websites and social media profiles to appear legitimate.

By targeting specific individuals, they impersonate known contacts or exploit existing business relationships to set up calls. During the conversation, they persuade victims to download software under the pretense of legitimate business or Web3 projects. Once installed, the malware steals sensitive information, such as cryptocurrency wallet details, which can lead to significant financial loss.

The macOS malware, disguised as a legitimate app, uses social engineering to trick victims into installing it. Once executed, it silently steals sensitive data from browsers, wallets, and system credentials, then sends it to a remote server.

It also collects system info, which is sent to a command-and-control server for further analysis and potential future attacks.

Cado Security Labs found a Windows version of Meeten malware, named MeetenApp.exe, which uses a stolen signature from Brys Software. The installer runs an Electron app that collects system information (HWID, IP, hostname, OS, users, RAM, etc.) and sends it to a remote server.

Additionally, UpdateMC is a Rust-based malware that steals sensitive data, including Telegram credentials, banking info, browser data, and cryptocurrency wallet details. The stolen data is compressed into a ZIP file and sent to a specific IP address. To maintain persistence, it adds a registry key to run at startup.

Recent cyberattacks use AI to trick users into downloading malware disguised as legitimate Electron apps, with AI-generated content making fake websites hard to identify.

Attackers create convincing content to increase the success of their attacks.

To stay safe, users should be cautious with unsolicited messages, especially on platforms like Telegram, verify message sources, and avoid clicking on suspicious links.

IOCs

http://172[.]104.133.212:8880/new_analytics

http://172[.]104.133.212:8880/opened

http://172[.]104.133.212:8880/metrics

http://172[.]104.133.212:8880/sede

139[.]162[.]179.170:8080

deliverynetwork[.]observer/qfast/UpdateMC.zip

deliverynetwork[.]observer/qfast/AdditionalFilesForMeet.zip

www[.]meeten.us

www[.]meetio.one

www[.]meetone.gg

www[.]clusee.com

199[.]247.4.86

Filemd5
CallCSSetup.pkg9b2d4837572fb53663fffece9415ec5a
Meeten.exe6a925b71afa41d72e4a7d01034e8501b
UpdateMC.exe209af36bb119a5e070bad479d73498f7
MicrosoftRuntimeComponentsX64.exed74a885545ec5c0143a172047094ed59
CluseeApp.pkg09b7650d8b4a6d8c8fbb855d6626e25d

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!