30s Summary
Cado Security Labs warns of scams targeting Web3 workers through fraudulent meeting apps, with cybercriminals using AI to create seemingly legitimate websites and social media accounts. The app, named “Meeten” or “Meetio”, steals sensitive data, such as credit card information and crypto wallet details. It can also obtain browser cookies and autofill credentials from apps such as Google Chrome and Microsoft Edge. Scammers create company websites filled with AI-generated content to seem credible, and use social engineering and spoofing tactics, sometimes posing as familiar contacts on apps like Telegram.
Full Article
Cado Security Labs has alerted that Web3 workers are being targeted by scammers using faux meeting apps to spread malware and steal information from websites, apps, and crypto wallets. Scammers are leveraging artificial intelligence to create fraudulent websites and social media accounts that look like bona fide companies. They then reach out to potential victims and try to trick them into downloading a meeting app.
The app, called “Meeten”, also goes by the name “Meetio”, and changes names frequently. Once downloaded, the app seeks out sensitive data like Telegram logins, credit card details, and crypto wallet information and sends it back to the culprits.
This app can also search for browser cookies and autofill credentials from apps like Google Chrome and Microsoft Edge. Moreover, it can steal info from Ledger, Trezor, and Binance Wallets as well. Sometimes, it uses social engineering and spoofing tactics. One instance was reported where a user was contacted on Telegram by an impersonator pretending to be a known contact and discussing a business opportunity.
To appear credible and legitimate, the scammers make a company website filled with AI-generated blogs, product content, and associated social media accounts. “While much of the recent focus has been on the potential of AI to create malware, threat actors are increasingly using AI to generate content for their campaigns” says Tara Gould from Cado.
Be cautious as well because the deceitful websites where users are encouraged to download the malware-infected software also contain Javascript that can rob crypto stored in web browsers, even before the malware is installed. Thus, stay safe and always verify the authenticity of an app or website before download or access.