A new scam campaign is targeting people working in Web3 by using fake video conferencing apps to deliver an information stealer called Realst. The threat actors behind the malware have set up fake companies and use AI to make them appear more legitimate.
The fake companies reach out to targets to schedule a video call, prompting the user to download the meeting application from the website. Once installed, users are prompted to enter their system password for the app to work properly.
The malware is designed to steal sensitive data such as cryptocurrency wallet information and export it to a remote server. It also steals Telegram credentials, banking information, and browser cookies.
Researchers say that AI-generated content is being used in these campaigns to make them more believable and harder to detect. This is not the first time fake meeting software has been used to deliver malware, with similar scams detected earlier this year.
The development comes as new stealer malware families are emerging, targeting users and businesses looking for pirated software and AI tools. The attackers behind the campaign appear to be interested in gaining access to organizations of Russian-speaking entrepreneurs who use software to automate business processes.
Cybersecurity researchers have warned of the threat, urging people to be cautious when receiving unsolicited video calls or downloading new applications from unknown websites.
Source: https://thehackernews.com/2024/12/hackers-using-fake-video-conferencing.html