Articles
Crypto Market Analysis

Lazarus-linked macOS malware hits crypto and fintech firms

User Image

由 匿名

創建 April 22, 2026|2 分鐘閱讀時間
Main Image

Security researchers linked a new “Mach-O Man” malware kit to a Lazarus campaign that uses fake meeting invites and ClickFix prompts to steal credentials and access corporate systems on macOS.

Security researchers have linked a new macOS malware campaign to the Lazarus Group, the North Korea-linked hacking operation behind some of the crypto industry’s biggest thefts.

Flagged on Tuesday, the new “Mach-O Man” malware kit is distributed via “ClickFix” social engineering schemes across traditional businesses and crypto companies, according to Mauro Eldritch, offensive security expert and founder of threat intelligence company BCA Ltd.

Victims are lured into a fake Zoom or Google Meet call where they are prompted to execute commands that download the malware in the background, allowing attackers to bypass traditional controls without detection to gain access to credentials and corporate systems, the security researcher said in a Tuesday report.

Researchers said the campaign can lead to account takeovers, unauthorized infrastructure access, financial losses and the exposure of critical data, underscoring how Lazarus continues to expand its targeting beyond crypto-native companies.

The Lazarus Group is the main suspect in some of the largest-ever cryptocurrency hacks, including the $1.4 billion hack of Bybit exchange in 2025, the industry’s largest so far. 

The final stage of the campaign is a stealer designed to extract browser extension data, stored browser credentials, cookies, macOS Keychain entries and other sensitive information from infected devices.

After collection, the data is archived into a zip file and exfiltrated through Telegram to the attackers. Finally, the malware’s self-deletion script removes the entire kit using the system’s rm command, which bypasses user confirmation and permissions when removing files.

The novel malware kit was reconstructed by the security expert through cloud-based malware sandbox Any.run’s macOS analysis capabilities.

Related: CZ sounds alarm as ‘SEAL’ team uncovers 60 fake IT workers linked to North Korea

Earlier in April, North Korean hackers used AI-enabled social engineering schemes to steal about $100,000 worth of funds from crypto wallet Zerion, after gaining access to some team members’ logged-in sessions, credentials and the company’s private keys, Cointelegraph reported on April 15. 

Magazine: 53 DeFi projects infiltrated, 50M NEO tokens could be ‘given back’: Asia Express

Source: CoinTelegraph


最近發表的其他文章

Tokenized Treasuries hit $15 billion as bitcoin stalls, Fed rate-rise concerns build
Tokenized Treasuries hit $15 billion as bitcoin stalls, Fed rate-rise concerns build

Bitcoin

Your day-ahead look for May 13, 2026Source: CoinDesk...

Hyperliquid ETF attracts $1.2M inflows in 'very solid' US debut
Hyperliquid ETF attracts $1.2M inflows in 'very solid' US debut

Trading Strategies

21Shares’ Hyperliquid ETF debuted in the US to a “very solid day” of trading, despite volumes ...

Legend becomes latest DeFi app to throw in towel
Legend becomes latest DeFi app to throw in towel

DeFi

“The product that wins isn’t the one that explains crypto better, it’s the one that hides it c...

Upexi falls 8% after widened fiscal Q3 net loss
Upexi falls 8% after widened fiscal Q3 net loss

Solana

Upexi increased its Solana holdings to 2.5 million, valued at more than $238 million, making it the ...

EToro profits rise as commodities boom offsets crypto trading slump
EToro profits rise as commodities boom offsets crypto trading slump

Trading Strategies

EToro posted its strongest quarter as a public company, with net income up 37% to $82 million, but c...

Jane Street slashes Bitcoin ETF holdings, adds Ether funds in Q1 2026
Jane Street slashes Bitcoin ETF holdings, adds Ether funds in Q1 2026

Bitcoin

Jane Street cut Bitcoin ETF holdings sharply in Q1 2026, including IBIT and FBTC, while adding at le...