Fake video conferencing apps are targeting Web3 workers to steal their data


Researchers are warning of a new “fake job” hacking campaign that targets primarily people working in the Web3 (blockchain) industry.

Experts at Cado Security Labs revealed the campaign started in September 2024, aiming to trick people into downloading infostealing malware to their devices, both for Windows and macOS. In some examples observed by the researchers, the victims were first contacted on Telegram, from a typosquatted account that impersonated a victim’s contact. They were offered a job opportunity, and even shared an investment presentation from the target’s company, meaning the attack was thoroughly prepared in advance.

Read more…
Source: TechRadar News


Sign up for our Newsletter


Related:

  • An Army of Thousands of Hacked Servers Found Mining Cryptocurrencies

    May 4, 2017

    A new botnet consisting of more than 15,000 compromised servers has been used to mine various cryptocurrencies, earning its master around $25,000 per month. Mining cryptocurrencies can be a costly investment, as it requires an enormous amount of computing power, but cybercriminals have found an easy money-making solution. Dubbed BondNet, the botnet was first spotted in December ...

  • After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts

    May 3, 2017

    Experts have been warning for years about security blunders in the Signaling System 7 protocol – the magic glue used by cellphone networks to communicate with each other. These shortcomings can be potentially abused to, for example, redirect people’s calls and text messages to miscreants’ devices. Now we’ve seen the first case of crooks exploiting the ...

  • Don’t click that Google Docs link! Gmail hijack mail spreads like wildfire

    May 3, 2017

    If you get an email today sharing a Google Docs file with you, don’t click it – you may accidentally hand over your Gmail inbox and your contacts to a mystery attacker. The phishing campaign really kicked off in a big way on Wednesday morning, US West Coast time. The malicious email contains what appears to ...

  • Hundreds of Fake UK Bank Sites Exposed, Pose High Risk for Customers

    May 3, 2017

    Hackers have registered over 300 domains with names similar to those of several popular British banks, which they use to trick customers into handing over personal details or login data. According to DomainTools, a company handling domain names and DNS-based cyber threats, 324 such domains were discovered only in relation to banks in the United Kingdom, ...

  • DDoS Attacks Can Cost Businesses Up to $2.5M Per Attack, Report Says

    May 2, 2017

    The time to respond and mitigate DDoS attacks can be costly for companies, and some businesses can lose roughly $2.5 million on average per attack, a research report released today said. Neustar, an analytics firm that sees swathes of DDoS attack telemetry daily, boiled down some of the figures in a dispatch, its annual Worldwide DDoS Attacks and Cyber Insights ...

  • PCs with Intel Server Chipsets, Launched Since 2010, Can be Hacked Remotely

    May 1, 2017

    Updated: Since the below-reported vulnerability is highly critical and it would take a few weeks for sysadmins to protect their enterprise network, the research team has not yet disclosed the technical details of the vulnerability. Meanwhile, I have talked with Maksim Malyutin, a member of Embedi research team who discovered the vulnerability in March, and updated ...