www.helpnetsecurity.com
Open in
urlscan Pro
52.38.211.32
Public Scan
URL:
https://www.helpnetsecurity.com/2024/12/06/information-cryptocurrency-stealing-malware-windows-macos/
Submission Tags: @nominet_threat_intel rnt-string-2nd reference_article_link confidence_medium cluster_58520661 Search All
Submission: On December 07 via api from GB — Scanned from GB
Submission Tags: @nominet_threat_intel rnt-string-2nd reference_article_link confidence_medium cluster_58520661 Search All
Submission: On December 07 via api from GB — Scanned from GB
Form analysis
2 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-298002 mc4wp-ajax" method="post" data-id="298002" data-name="Breaking news">
<div class="mc4wp-form-fields"><img decoding="async" class="aligncenter" title="OPIS" src="https://img2.helpnetsecurity.com/posts2024/devider.webp" alt="OPIS">
<img decoding="async" src="https://img2.helpnetsecurity.com/posts2024/newsletter_ad-550x98px_5.webp" class="aligncenter" alt="OPIS" title="OPIS">
<br>
<label>
<input type="email" name="EMAIL" size="35" placeholder="Please enter your e-mail address" required="">
</label> <input type="submit" value="Subscribe">
<p></p>
<p>
<label>
<input type="checkbox" name="AGREE_TO_TERMS" value="1" required=""> I have read and agree to the <a href="https://www.helpnetsecurity.com/privacy-policy/#personalized" target="_blank" rel="noopener">terms & conditions</a>
</label>
<img decoding="async" class="aligncenter" title="OPIS" src="https://img2.helpnetsecurity.com/posts2024/devider.webp" alt="OPIS">
</p>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1733594070"><input type="hidden" name="_mc4wp_form_id" value="298002"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
POST
<form id="mc4wp-form-2" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - editor's choice selection of topics (twice per month)</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1733594070"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-2">
<div class="mc4wp-response"></div>
</form>
Text Content
Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here! * News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. Zeljka Zorz, Editor-in-Chief, Help Net Security December 6, 2024 Share WINDOWS, MACOS USERS TARGETED WITH CRYPTO-AND-INFO-STEALING MALWARE Downloading anything from the internet is a gamble these days: you might think that you are downloading an innocuous app from a legitimate firm but thanks to clever misuse of AI and some social engineering, you can end up with information and cryptocurrency-stealing malware. Case in point: Cado Security Labs researchers have recently reported websites set up to impersonate companies offering a video conferencing app, but serving/pushing the Realst info-stealer. PREPARING AND EXECUTING THE SCAM To start, the crooks create websites with the help of AI tools, to create the illusion of the websites belonging to legitimate companies. They also set up accounts on Twitter and Medium, for good measure. After setting the stage, the crooks reach out to the targets. In one reported instance, a user was contacted via Telegram by an acquaintance – or so they thougth. The Telegram account was created to impersonate a contact of the target, Cado researchers said, and the scammer even sent an investment presentation from the target’s company to the target. Other users report being on calls related to Web3 work and being instructed to download the software. The domains for the websites and the app offered for download use variations of the word Meeten. THE DOWNLOAD PAGE OF THE MEETEN WEBSITE (SOURCE: CADO SECURITY LAB) “The company regularly changes names, has also gone by Clusee[.]com, Cuesee, Meeten[.]gg, Meeten[.]us, Meetone[.]gg and is currently going by the name Meetio,” the researchers shared. In addition to hosting information stealers, the Meeten websites also contain code to steal cryptocurrency even before the fake video app is installed. “Cryptocurrency is stored in wallets which can take many forms. On one end you have hardware wallets which are standalone devices which store cryptocurrency keys separate to a computer. Another type of wallet is a web browser extension which could be attacked via JavaScript in a malicious website,” Paul Scott, Solutions Engineer at Cado Security told Help Net Security. “If a user has their wallet unlocked in their browser and visit a malicious website, the JavaScript on the site automatically checks if there are unlocked wallets present and will attempt to transfer cryptocoins to a wallet the attacker controls.” This particular campaign seems to be aimed at persons working with Web3 technologies (e.g., blockchain), and has been active approximately four months. THE MALWARE Tha fake apps are actually macOS and Windows variants of the Realst infostealer, which was first discovered in 2023 by security researcher iamdeadlyz. The malware looks to steal Telegram credentials; keychain credentials; browser cookies and credentials stored in Chrome, Opera, Brave, Edge, Arc, CocCoc and Vivaldi browsers; Ledger, Trezor, Phantom and Binance wallets; and banking card details. Whether Realst is commodity malware or custom-made by a specific threat actor is currently impossible to say. “During our research we didn’t find any evidence of it being sold on marketplaces,” Tara Gould, Threat Research Lead at Cado Security, told Help Net Security. “Being that the majority of stealers, and in particular crypto stealers, tend to be commodity, it may be more likely than custom – but we cannot say for sure at the moment.” A definitive attribution of the campaign is also impossible at the moment. “The targeting of macOS and cryptocurrency, along with the fake company, are in line with the tactics, techniques, and procedures (TTPs) of North Korean hackers, however this alone is not enough to make a determination,” Gould said. “There is also the likely possibility of the campaign being conducted by cybercriminals as opposed to an APT group.” The websites serving the malware have since been taken down, but the researchers advise users to be careful when being approached about business opportunities, especially through Telegram: “Even if the contact appears to be an existing contact, it is important to verify the account and always be diligent when opening links.” I have read and agree to the terms & conditions Leave this field empty if you're human: More about * artificial intelligence * Cado Security * cryptocurrency * macOS * malware * social engineering * video conferencing * Windows Share FEATURED NEWS * Windows, macOS users targeted with crypto-and-info-stealing malware * December 2024 Patch Tuesday forecast: The secure future initiative impact * Building a robust security posture with limited resources How to leverage the 2024 MITRE ATT&CK Evaluation results RESOURCES * Download: The Ultimate Guide to the CCSP * Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow * Download: The Ultimate Guide to the CISSP * Whitepaper: Securing GenAI * Report: Voice of Practitioners 2024 – The True State of Secrets Security DON'T MISS * Resecurity introduces AI-powered GSOC at NATO Edge 2024 * Windows, macOS users targeted with crypto-and-info-stealing malware * How to choose secure, verifiable technologies? * December 2024 Patch Tuesday forecast: The secure future initiative impact * Building a robust security posture with limited resources Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - editor's choice selection of topics (twice per month) Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2024 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×