{"id":102500,"date":"2024-12-06T12:32:56","date_gmt":"2024-12-06T20:32:56","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=102500"},"modified":"2024-12-06T23:48:36","modified_gmt":"2024-12-07T07:48:36","slug":"mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/","title":{"rendered":"Mac malware masquerades as meeting apps: Realst Stealer is back!"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-102487\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>The Mac malware family Realst Stealer is back in the news. Reports indicate that a recent malware campaign has been tricking victims into installing videoconferencing meeting software. But this software is actually a Trojan horse with password-stealing capabilities.<\/p>\n<p>Let&#8217;s explore what we know about this active Mac malware campaign.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#how-spreads\">How is the malware currently spreading?<\/a><\/li>\n<li><a href=\"#what-does\">What does the malware do?<\/a><\/li>\n<li><a href=\"#staysafe\">How can I keep my Mac safe from stealer malware?<\/a><\/li>\n<li><a href=\"#sites\">What can we glean from the malware distribution sites?<\/a><\/li>\n<li><a href=\"#iocs\">Indicators of compromise (IOCs)<\/a><\/li>\n<li><a href=\"#other-names\">Do security vendors detect this by any other names?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"how-spreads\"><\/a><\/li>\n<\/ul>\n<h3>How is the malware currently spreading?<\/h3>\n<p>In a recent campaign, threat actors have been targeting people looking for a job at a &#8220;Web3&#8221; company; i.e. working with technologies such as blockchains, NFTs, or cryptocurrencies similar to Bitcoin.<\/p>\n<p>Victims may be invited to a call, and are given a link to a site that claims to offer meeting software for Mac or Windows. The site and software may go by any number of names; so far, they have reportedly included Meeten, Meetio, Meetone, Clusee, and Cuesee. As of when this article is being published, the <strong>Meetio[.]one and Meeten[.]org sites are currently online<\/strong>, and some <strong>browsers are not yet detecting these sites as malicious<\/strong>. A site delivering secondary payloads, <strong>deliverynetwork[.]observer, is still online<\/strong> as well.<\/p>\n<p>It&#8217;s worth noting that <strong>the same fake meeting software could potentially be used in other scam campaigns<\/strong> as well. You may not work in Web3 technology, but a variation of the scam could be used against you regardless of your interests.<\/p>\n<p>These Trojan horse applications are built using the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/\">Electron framework<\/a>. Electron is a free, open-source software framework that makes it easy to build cross-platform apps\u2014including malware.<a name=\"what-does\"><\/a><\/p>\n<h3>What does the malware do?<\/h3>\n<p>The malware will attempt to <strong>steal sensitive data<\/strong> from the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-and-ios-keychain-tutorial-how-apples-icloud-keychain-works\/\">macOS Keychain (i.e. Passwords database)<\/a>, various <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/chromium\/\">Chromium-based browsers<\/a> (namely Google Chrome, Microsoft Edge, Arc, Brave, Opera, Vivaldi, and the Vietnamese browser C\u1ed1c C\u1ed1c), the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-secure-messaging-app-options-for-mac-and-ios\/\">Telegram Messenger app<\/a>, and popular <a href=\"https:\/\/www.intego.com\/mac-security-blog\/cryptocurrency-101-part-1-blockchain-and-basic-concepts\/\">cryptocurrency<\/a> wallets.<\/p>\n<p>Among the data stolen from browsers are <strong>cookies<\/strong> (which can often be reused on an attacker&#8217;s system to bypass passwords and two-factor authentication) and <strong>autofill data<\/strong>, potentially including usernames and passwords.<\/p>\n<p>These Trojans may be variants of Realst Stealer. Realst came to light around mid-2023, when it was observed in sophisticated campaigns <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-stealer-malware-realst-disguises-itself-as-video-games-is-macos-sonoma-ready\/\">targeting gamers interested in NFT and Web3 video games<\/a>. We also reported about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-data-stealer-malware-roundup-atomicstealer-metastealer-realst-all-active-in-september\/\">Realst&#8217;s recruiting efforts<\/a> shortly thereafter.<a name=\"staysafe\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"tdDu9q3EO4\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-stealer-malware-realst-disguises-itself-as-video-games-is-macos-sonoma-ready\/\">Mac stealer malware Realst disguises itself as video games, is macOS Sonoma-ready<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Mac stealer malware Realst disguises itself as video games, is macOS Sonoma-ready&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/mac-stealer-malware-realst-disguises-itself-as-video-games-is-macos-sonoma-ready\/embed\/#?secret=tdDu9q3EO4\" data-secret=\"tdDu9q3EO4\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I keep my Mac safe from stealer malware?<\/h3>\n<p>If you use Intego VirusBarrier, you&#8217;re already protected from this malware. Intego detects samples from this campaign as <strong>OSX\/ChainBreaker.fs<\/strong>, <strong>OSX\/Stealer.ext<\/strong>, <strong>Python\/KeychainDump<\/strong>, and <strong>trojan\/TR\/PSW.Agent.lyel<\/strong>.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s latest Mac operating system, macOS Sequoia.<\/p>\n<p>One of VirusBarrier&#8217;s unique features is that it can <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207114798-VirusBarrier-X9-How-to-Scan-iPhone-iPad-and-iPod-Touch\">scan for malicious files on an iPhone, iPad, or iPod touch<\/a> in user-accessible areas of the device. Just attach your iOS or iPadOS device to your Mac via a USB cable and open VirusBarrier.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from malware, too.<a name=\"sites\"><\/a><\/p>\n<h3>What can we glean from the malware distribution sites?<\/h3>\n<p>As we saw with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-stealer-malware-realst-disguises-itself-as-video-games-is-macos-sonoma-ready\/\">Realst&#8217;s elaborate video game Trojans<\/a> last year, the distributors of these Trojan horses went to a lot of trouble to make these videoconferencing Trojans look legitimate. Each variant has had its own homepage, Telegram, Linktree, and X (aka Twitter) social network profiles.<\/p>\n<div id=\"attachment_102510\" style=\"width: 811px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-102510\" loading=\"lazy\" class=\"size-full wp-image-102510\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Meetio-Trojan-horse-fake-videoconference-meeting-software-site.jpg\" alt=\"\" width=\"801\" height=\"865\" \/><p id=\"caption-attachment-102510\" class=\"wp-caption-text\">&#8220;Meetio&#8221; and &#8220;Meeten&#8221; sites are nearly identical. While they may look harmless, they have distributed Trojan malware.<\/p><\/div>\n<p>The @MeetioHQ handle on X is still active as of the time of this publication. It has been a &#8220;verified&#8221; account with a blue-check badge since last month. &#8220;Meetio&#8221; currently has more than 8,500 followers\u2014but only two are verified accounts; this suggests that most of the rest are likely bots.<\/p>\n<div id=\"attachment_102506\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-102506\" loading=\"lazy\" class=\"size-full wp-image-102506\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/MeetioHQ-malware-distributor-on-X.jpg\" alt=\"\" width=\"600\" height=\"539\" \/><p id=\"caption-attachment-102506\" class=\"wp-caption-text\">@MeetioHQ, a malware distributor with a &#8220;verified&#8221; X account<\/p><\/div>\n<p>Interestingly, the account was created in December 2020, though &#8220;Meetio&#8221; posts only date back to November 20, 2024; this may indicate that a dormant account was reactivated by the malware distributors, or that a years-old account may have been hacked.<a name=\"iocs\"><\/a><\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p>Following are SHA-256 or MD5 hashes of malware samples from this campaign:<\/p>\n<pre>0f38a620cb3641ffb2d7472472d65700634199e54e451087c316aecba3613ae0*\r\nbe012ac8a3f046e56e1c6a293ae567462c01216d024032c4225f656d8002691e\r\nb5c1260e6f4acc44470c3fb18c665832d15f478005eb291e2caeff94fc5b7d6f*\r\n5e6cc2ed3876197561ba60a8d8aa7042d025e997cc1046ea351b5b2bc48f9dd7\r\n693731b1ff6e49f698e0aee2a97ae5d7ddbbd104ddec86e0d27bbd0e52e4b0a3*\r\n7c1f28ac0a115bfe6f272acb86e3c0f2c9aa5b52d2cfad087a1abcc0dd7ac771*\r\n8d731b0bd8c0cda9f923ed0980ea76d57ba036c3a73acb9f4ac8ffe4e4734b83\r\n98cb1ab05047e6ff2b614ce9f6f0cf6ece6592522c90898ce1f43d646e7edfea*\r\naea0bfbba8dd4f3cb99b33792e044af653c2ea07af960f9587d389160497d647\r\nf3381109a90f1c2be9e005dcf6d4095766123978d786a2531c5631df4b7d883e*\r\n9b2d4837572fb53663fffece9415ec5a [unavailable on VirusTotal]\r\n*first reported by Intego<\/pre>\n<p>File names for the malicious payloads have included the following:<\/p>\n<pre>MeetioSetup.pkg*\r\nMeetenAppSetup.pkg*\r\nCluseeApp.pkg\r\nCallCSSetup.pkg\r\nMeeten.exe\r\nMeetenApp.exe\r\nMicrosoftRuntimeComponentsX64.exe\r\nUpdateMC.exe\r\n*first reported by Intego<\/pre>\n<p>This malware campaign leverages the following domains and IP addresses:<\/p>\n<pre>meetio[.]one\r\nmeeten[.]us\r\ndeliverynetwork[.]observer\r\nclusee[.]com\r\nmeetone[.]gg\r\n81.28.12[.]12*\r\n139.162.179[.]170\r\n172.104.133[.]212\r\n199.247.4[.]86\r\n*first reported by Intego\r\n<\/pre>\n<p>Network administrators can check logs to try to identify whether any computers may have attempted to contact the domains or IPs above in recent weeks, which could indicate a possible infection.<\/p>\n<p>The malware campaign also currently uses the following social media accounts:<\/p>\n<pre>linktr[.]ee\/meetio\r\nt[.]me\/meetiohq\r\nx[.]com\/MeetioHQ\r\nmeetioapp.medium[.]com\r\nlinktr[.]ee\/meeten\r\nt[.]me\/meetenhq<\/pre>\n<p><a name=\"other-names\"><\/a><\/p>\n<h3>Do security vendors detect this by any other names?<\/h3>\n<p>Other antivirus vendors&#8217; names for this malware may include variations similar to the following:<\/p>\n<p><span style=\"font-size: small;\">A Variant Of Win64\/PSW.Agent.FC, Exe.trojan.stealer, Generic.MAC.Stealer.J.3BEE0F67 (B), Generic.MAC.Stealer.J.46AF4C95 (B), Generic.ml, HEUR:Trojan-PSW.OSX.HashBreaker.e, Infostealer.Win64.Agent.V73i, JS\/TrojanDownloader.Agent.ABSC, MacOS:Stealer-AR [Trj], MacOS\/ABPWS.ZWLX-9, MacOS\/ABTrojan.ZWLX-, Mal\/Generic-S, Malicious_Behavior.SB, Malware.OSX\/GM.Stealer.XS, Malware.Win32.Antis, Malware.Win32.Gencirc.11cacd7d, Malware\/Win.Generic.C5695177, Osx.Trojan-QQPass.QQRob.Dplw, Osx.Trojan-QQPass.QQRob.Edhl, Osx.Trojan-QQPass.QQRob.Rsmw, OSX.Trojan.Gen, OSX\/Agent-BKOX, OSX\/Agent.BX!tr.pws, OSX\/GM.Stealer.XS, OSX\/PWS-COF, Password-Stealer ( 005ad7011 ), PUP\/Generic, RiskWare:Win\/Stealerc.npb, Spyware.Stealer!8.3090 (CLOUD), Suspicious.low.ml.score, Tar.trojan.stealer, Ti!AEA0BFBBA8DD, TR\/PSW.Agent.lyely, Trojan-PSW.Discord, Trojan-PSW.Win32.Stealerc.nfa, Trojan:MacOS\/Multiverze, Trojan.Agent.Win64.63740, Trojan.Gen.MBT, Trojan.MAC.Agent.ZW, Trojan.MAC.Generic.118582, Trojan.OSX.Psw, Trojan.OSX.Stealer.i!c, Trojan.TR\/PSW.Agent.lyely, Trojan.UKP.Stealer.i!c, Trojan.Win32.Stealer.12!c, Trojan[stealer]:MacOS\/HashBreaker.C9OKG, Trojan[stealer]:MacOS\/HashBreaker.e, Trojan[stealer]:MacOS\/Multiverze.Gen, TrojanPSW:Win32\/Stealerc.c44afb60, TrojanSpy\/Stealer.na, W32.Malware.gen, W64\/ABPWS.AKFA-6874, Win64:MalwareX-gen [Trj], Xar.trojan.stealer<\/span><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>This malware was first written about by <a href=\"https:\/\/www.cadosecurity.com\/blog\/meeten-malware-threat\" target=\"_blank\" rel=\"noopener nofollow\">Tara Gould<\/a>; see Gould&#8217;s report for additional technical details.<\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Mac malware family known as Realst Stealer is back, and scammers are tricking victims into installing fake videoconference meeting software. Extremely sensitive data may then be stolen from victims\u2019 Macs. Watch out!<\/p>\n","protected":false},"author":14,"featured_media":102485,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4682,41,86,4722,3364],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A Mac malware family known as Realst Stealer is back, and scammers are tricking victims into installing fake videoconference meeting software. Extremely sensitive data may then be stolen from victims\u2019 Macs. Watch out!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac malware masquerades as meeting apps: Realst Stealer is back! - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A Mac malware family known as Realst Stealer is back, and scammers are tricking victims into installing fake videoconference meeting software. Extremely sensitive data may then be stolen from victims\u2019 Macs. Watch out!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-06T20:32:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-07T07:48:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Trojan horse Apple macOS videoconferencing Mac app malware icon\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/\",\"name\":\"Mac malware masquerades as meeting apps: Realst Stealer is back! - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#primaryimage\"},\"datePublished\":\"2024-12-06T20:32:56+00:00\",\"dateModified\":\"2024-12-07T07:48:36+00:00\",\"description\":\"A Mac malware family known as Realst Stealer is back, and scammers are tricking victims into installing fake videoconference meeting software. Extremely sensitive data may then be stolen from victims\\u2019 Macs. Watch out!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac malware masquerades as meeting apps: Realst Stealer is back!\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Mac malware masquerades as meeting apps: Realst Stealer is back!\",\"datePublished\":\"2024-12-06T20:32:56+00:00\",\"dateModified\":\"2024-12-07T07:48:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#webpage\"},\"wordCount\":1211,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg\",\"keywords\":[\"Chromium\",\"Cookies\",\"Malware\",\"Stealer Malware\",\"Telegram Messenger\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A Mac malware family known as Realst Stealer is back, and scammers are tricking victims into installing fake videoconference meeting software. Extremely sensitive data may then be stolen from victims\u2019 Macs. Watch out!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/","og_locale":"en_US","og_type":"article","og_title":"Mac malware masquerades as meeting apps: Realst Stealer is back! - The Mac Security Blog","og_description":"A Mac malware family known as Realst Stealer is back, and scammers are tricking victims into installing fake videoconference meeting software. Extremely sensitive data may then be stolen from victims\u2019 Macs. Watch out!","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-12-06T20:32:56+00:00","article_modified_time":"2024-12-07T07:48:36+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg","width":400,"height":260,"caption":"Trojan horse Apple macOS videoconferencing Mac app malware icon"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/","name":"Mac malware masquerades as meeting apps: Realst Stealer is back! - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#primaryimage"},"datePublished":"2024-12-06T20:32:56+00:00","dateModified":"2024-12-07T07:48:36+00:00","description":"A Mac malware family known as Realst Stealer is back, and scammers are tricking victims into installing fake videoconference meeting software. Extremely sensitive data may then be stolen from victims\u2019 Macs. Watch out!","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac malware masquerades as meeting apps: Realst Stealer is back!"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Mac malware masquerades as meeting apps: Realst Stealer is back!","datePublished":"2024-12-06T20:32:56+00:00","dateModified":"2024-12-07T07:48:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#webpage"},"wordCount":1211,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg","keywords":["Chromium","Cookies","Malware","Stealer Malware","Telegram Messenger"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-malware-masquerades-as-meeting-apps-realst-stealer-is-back\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/12\/Trojan-horse-Apple-macOS-videoconferencing-app-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qFe","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102500"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=102500"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102500\/revisions"}],"predecessor-version":[{"id":102511,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102500\/revisions\/102511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/102485"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=102500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=102500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=102500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}