We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Crypto Malware Targets Web3 Pros via Fake Meeting Apps

Crypto Malware Targets Web3 Pros via Fake Meeting Apps
Anka Markovic Borak Published on 14th December 2024 Writer and Quality Assessor

Hackers are targeting Web3 professionals with malware disguised as video conferencing apps, in an effort to steal cryptocurrency and sensitive data. The campaign, active since September 2024, primarily affects users on Windows and macOS.

The attack revolves around a fraudulent meeting platform called "Meeten," discovered by Cado Security Labs. The malware, named Realst, pilfers cryptocurrency assets, browser credentials, and banking details. Meeten's branding shifts frequently, with prior iterations named "Clusee," "Cuesee," and "Meetone." These counterfeit platforms use realistic websites and social media accounts filled with AI-generated material to appear credible.

On macOS, victims receive a file named “CallCSSetup.pkg.” When run, the malware prompts users for their system password, gaining elevated privileges. It then extracts data, including browser cookies, autofill credentials, Telegram credentials, and wallet information from apps like Ledger and Trezor. Exfiltrated data, along with system details, is sent to a remote server. The malware deceives users with a message claiming, "Cannot connect to the server. Please reinstall or use a VPN," while it steals data in the background.

The Windows version, distributed as “MeetenApp.exe,” carries a stolen digital certificate, making detection more challenging. It also modifies the registry to ensure persistence after reboots.

Cado Security Labs also warns that Meeten websites contain JavaScript designed to drain connected cryptocurrency wallets directly.

The campaign highlights the risks of downloading unverified software, especially in Web3 spaces where social engineering is prevalent. Web3 professionals should remain vigilant, avoid software recommended through unverified channels, and scan downloads using trusted antivirus platforms, such as VirusTotal.

Based on the data the FBI published, social engineering is the basis of 98% of all cyber crimes. Readers are advised to equip themselves with the necessary knowledge about social engineering attacks and the best methods of protection.

About the Author

Anka Markovic-Borak is a writer and quality assessor at vpnMentor, who leverages her expertise to write insightful articles on cybersecurity, driven by her passion for protecting online privacy. She also ensures articles written by others are reaching vpnMentor's high standards.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address