Sophisticated Social Engineering Campaign Targets Crypto Users with Fake AI and Gaming Startups

2 Sources

Share

A complex social engineering scheme is targeting cryptocurrency users by impersonating AI, gaming, and Web3 startups, using compromised social media accounts and malware to steal digital assets.

Elaborate Social Engineering Scheme Unveiled

Cybersecurity researchers have uncovered an ongoing sophisticated social engineering campaign targeting cryptocurrency users. The scheme, which impersonates AI, gaming, and Web3 firms, aims to trick victims into downloading malware that can drain digital assets from both Windows and macOS systems

1

.

Source: The Hacker News

Source: The Hacker News

Tactics and Techniques

The attackers employ a range of deceptive tactics to lend credibility to their fake startups:

  1. Spoofed social media accounts
  2. Project documentation hosted on legitimate platforms like Notion and GitHub
  3. Compromised verified X accounts of companies and employees
  4. Professional-looking websites with employee profiles, product blogs, and whitepapers

One such fictitious company, Eternal Decay (@metaversedecay), claims to be a blockchain-powered game and has shared digitally altered images on X to create the illusion of conference presentations

1

.

Attack Methodology

The attack chain typically begins with the threat actors contacting potential victims through X messages, Telegram, or Discord. They offer cryptocurrency payments in exchange for testing their software

2

.

Upon agreement, victims are directed to a fake website where they're prompted to enter a registration code to download either a Windows Electron application or an Apple disk image (DMG) file

1

.

Malware Deployment

On Windows systems, the malicious application displays a Cloudflare verification screen while covertly profiling the machine and downloading an MSI installer. The exact nature of the payload remains unclear, but it's suspected to be an information stealer

1

.

For macOS, the attack deploys the Atomic macOS Stealer (AMOS), which can exfiltrate documents, web browser data, and crypto wallet information. The malware also establishes persistence using a Launch Agent and monitors user activity

1

.

Historical Context and Similarities

This campaign shares similarities with the Meeten campaign observed in December 2024, which used fake videoconferencing platforms to infect victims with stealer malware like Realst

1

.

Darktrace researchers have noted tactical similarities with campaigns orchestrated by a traffers group called Crazy Evil, known for distributing malware such as StealC, AMOS, and Angel Drainer

1

.

Broader Implications for Cryptocurrency Security

The cryptocurrency industry continues to grapple with various scams and frauds, including "pig butchering" scams and "four-dollar wrench attacks." The sophistication of these attacks has increased, often leveraging social engineering, hacked social media accounts, and insider fraud

2

.

As the threat landscape evolves, users are advised to remain vigilant and skeptical of unsolicited offers or requests to test new software, especially when cryptocurrency payments are involved. The incident underscores the need for robust security measures and user education in the rapidly changing world of digital assets and blockchain technology.

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo