The post Lazarus Group Deploys macOS Malware in Crypto Executive Hunt appeared on BitcoinEthereumNews.com. Lazarus Group Mach-O Man campaign targets crypto andThe post Lazarus Group Deploys macOS Malware in Crypto Executive Hunt appeared on BitcoinEthereumNews.com. Lazarus Group Mach-O Man campaign targets crypto and

Lazarus Group Deploys macOS Malware in Crypto Executive Hunt

2026/04/23 08:08
Okuma süresi: 3 dk
Bu içerikle ilgili geri bildirim veya endişeleriniz için lütfen [email protected] üzerinden bizimle iletişime geçin.
  • Lazarus Group Mach-O Man campaign targets crypto and fintech executives with fake meeting links.
  • Victims paste a Mac Terminal command that opens access to systems, SaaS accounts, and funds.
  • CertiK linked related attacks to over $500M in two weeks, while lifetime loot hit $6.7B.

Security experts warned Wednesday that North Korea’s state-backed Lazarus Group has launched a new “Mach-O Man” campaign aimed at crypto, fintech, and other high-value executives. According to reports, the operation uses Telegram messages, fake meeting pages, and a copied Terminal command on macOS to steal credentials, browser sessions, and Keychain data.

Researchers said the toolkit can erase itself after an attack, reducing visibility for detection tools and complicating efforts to trace the breach. SlowMist Chief Information Security Officer 23pds warned on X that the Lazarus Group’s newly released “Mach-O Man” campaign poses fresh risks, urging both individuals and organizations to stay vigilant.

A Chainanalysis report estimated the collective’s cumulative loot at $6.7 billion since 2017, while CertiK linked recent related attacks to more than $500 million. Those incidents involved Drift and KelpDAO exploits during the past two weeks, according to reports.

How the ‘Mach-O Man’ Campaign Works

According to Mauro Eldritch, founder of threat intelligence firm BCA Ltd., the attackers send executives an urgent meeting invite over Telegram. The message directs targets to a fake Zoom, Microsoft Teams, or Google Meet page that claims a simple Terminal command will fix a connection issue.

However, when victims paste the command, they hand over access to corporate systems, SaaS platforms, and financial resources. CertiK researchers said the malware is a modular macOS toolkit that can self-delete after the attack.

That feature can delay discovery and make it harder for victims to identify the variant used against them. In many cases, victims may not realize they have been compromised until the attackers have already caused significant damage.

What the Attackers Want

Based on Mauro’s report, the attackers appear to be after credentials, browser sessions, and macOS Keychain data that could provide access to infrastructure and financial assets. Telegram is also used as a trusted exfiltration channel, allowing sensitive information to be moved outside an organization with less suspicion.

Together, these tactics can result in account takeovers, unauthorized access to internal systems, financial losses, and exposure of critical data. Notably, the campaign relies heavily on social engineering and native macOS binaries, a combination that can reduce visibility for traditional endpoint detection and response tools.

For chief information security officers, the warning is clear: a single compromised macOS device could provide a gateway into internal systems, production environments, or even crypto asset holdings.

Scale of the Threat

CertiK researcher Natalie Newson told CoinDesk that the crypto industry should treat Lazarus Group as a persistent, well-funded threat from a nation-state. She said KelpDAO, Drift, and the new macOS toolkit appeared in the same month, showing sustained activity rather than isolated incidents. She described the pattern as a state-directed financial operation running at an institutional scale and speed.

CertiK researcher Natalie Newson told CoinDesk:

Related: KelpDAO Hacker Moves Stolen ETH, Funds Routed to Tron via LayerZer

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.

Source: https://coinedition.com/lazarus-group-deploys-new-macos-malware-toolkit-in-crypto-exec-hunt/

Piyasa Fırsatı
Notcoin Logosu
Notcoin Fiyatı(NOT)
$0.000395
$0.000395$0.000395
-1.88%
USD
Notcoin (NOT) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!