Lazarus-linked macOS malware hits crypto and fintech firms

Security researchers linked a new “Mach-O Man” malware kit to a Lazarus campaign that uses fake meeting invites and ClickFix prompts to steal credentials and access corporate systems on macOS.
Security researchers have linked a new macOS malware campaign to the Lazarus Group, the North Korea-linked hacking operation behind some of the crypto industry’s biggest thefts.
Flagged on Tuesday, the new “Mach-O Man” malware kit is distributed via “ClickFix” social engineering schemes across traditional businesses and crypto companies, according to Mauro Eldritch, offensive security expert and founder of threat intelligence company BCA Ltd.
Victims are lured into a fake Zoom or Google Meet call where they are prompted to execute commands that download the malware in the background, allowing attackers to bypass traditional controls without detection to gain access to credentials and corporate systems, the security researcher said in a Tuesday report.
Source: Cointelegraph →Related News
- 3 hours ago
Strategy to repurchase $1.5B of 2029 convertible notes
- 8 hours ago
OpenAI partners with Malta to give all citizens free ChatGPT Plus access
- 12 hours ago
THORChain confirms $10M exploit, rolls out recovery portal for affected users
- 13 hours ago
Sharplink CEO points out 3 catalysts for Ethereum's price to surge higher
- 14 hours ago
Spot Bitcoin ETFs bleed $1B in a week, snapping six-week inflow run
