Meeten Malware Campaign Reportedly Undermines Web3 Security Using AI-Legitimized Branding

December 6, 2024

Threat actors reportedly used AI-generated content to create deceptive company websites, blogs, and social media profiles, masquerading as legitimate businesses. By impersonating brands such as 'Meeten,' 'Meetio,' and 'Clusee,' these actors targeted Web3 professionals and cryptocurrency users, tricking them into downloading the Realst malware. This malware, which allegedly targets macOS and Windows platforms, is said to steal credentials, browser data, and cryptocurrency wallet information, sending sensitive data to remote servers.

For those interested in promoting trustworthy AI practices and safeguarding Web3 environments, join us at Project Cerebellum. By contributing to the HISPI Project Cerebellum TAIM (Govern, Map, Measure, or Manage), you can help establish guardrails for AI and ensure safer and more secure digital interactions.

JOIN US

Matched TAIM controls

Suggested mapping from embedding similarity (not a formal assessment). Browse all TAIM controls

Alleged deployer
meeten, meetone, meetio, clusee, cuesee
Alleged developer
meeten, meetone, meetio, clusee, cuesee
Alleged harmed parties
web3-professionals, cryptocurrency-users

Source

Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/870

Data source

Incident data is from the AI Incident Database (AIID).

When citing the database as a whole, please use:

McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.

Pre-print on arXiv · Database snapshots & citation guide

We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.