AI-Powered Crypto Scam Targets Web3 Workers with Fake Meeting Apps

2 Sources

Share

A sophisticated scam using AI-generated content and fake meeting apps is targeting Web3 workers to steal crypto wallets and sensitive information. The scheme involves social engineering and malware distribution.

News article

AI-Powered Scam Targets Web3 Workers

A sophisticated crypto-stealing scam campaign is targeting Web3 workers, leveraging artificial intelligence (AI) to create convincing fake meeting apps and websites. Cado Security Labs has uncovered this scheme, which uses social engineering tactics to lure victims into downloading malware-infected applications

1

.

The Deceptive "Meeten" App

The primary tool in this scam is a fake meeting app, which has operated under various names including "Meeten," "Meetio," "Clusee.com," and "Meetone.gg." This app contains a Realst info stealer, designed to hunt for sensitive information such as:

  • Telegram logins
  • Banking card details
  • Crypto wallet information (Ledger, Trezor, Phantom, and Binance)
  • Browser cookies and autofill credentials from popular browsers

    2

AI-Generated Legitimacy

What sets this scam apart is its use of AI to generate convincing content. The threat actors create seemingly legitimate company websites with AI-generated blogs, product content, and accompanying social media accounts on platforms like X and Medium. This AI-powered approach allows scammers to quickly produce realistic website content, adding an air of legitimacy to their operations and making it more challenging to detect suspicious websites

1

.

Sophisticated Social Engineering

The scammers employ targeted social engineering tactics. In one instance, a user reported being contacted on Telegram by an impersonator posing as a known contact to discuss a business opportunity. The scammer even sent an investment presentation from the target's own company, demonstrating the sophisticated and targeted nature of the attack

1

.

Cross-Platform Threat

The malware campaign has both macOS and Windows variants, indicating a broad reach across different operating systems. The fake websites used to distribute the malware contain JavaScript that can steal crypto stored in web browsers even before the malware is installed

2

.

Ongoing Threat and Precautions

This scam has been active for approximately four months, according to Cado Security Labs. To protect against such threats, users are advised to:

  1. Verify the identity of contacts, especially when approached about business opportunities.
  2. Be cautious when opening links, even from seemingly known contacts.
  3. Use up-to-date antivirus software and secure browsers.
  4. Be wary of unexpected communications, particularly those prompting software downloads

    2

    .

Broader Implications

This scam is part of a growing trend of AI-assisted cyber threats. In August, onchain sleuth ZackXBT identified 21 developers, allegedly North Koreans, working on various crypto projects using fake identities. The FBI has also warned about North Korean hackers targeting crypto companies and DeFi projects with malware disguised as employment offers

1

.

As AI continues to evolve, it's likely that we'll see more sophisticated scams leveraging this technology to create convincing fake personas and content, posing significant challenges for cybersecurity professionals and end-users alike.

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo