Lazarus-linked macOS malware hits crypto and fintech firms

Security researchers linked a new “Mach-O Man” malware kit to a Lazarus campaign that uses fake meeting invites and ClickFix prompts to steal credentials and access corporate systems on macOS.
Security researchers have linked a new macOS malware campaign to the Lazarus Group, the North Korea-linked hacking operation behind some of the crypto industry’s biggest thefts.
Flagged on Tuesday, the new “Mach-O Man” malware kit is distributed via “ClickFix” social engineering schemes across traditional businesses and crypto companies, according to Mauro Eldritch, offensive security expert and founder of threat intelligence company BCA Ltd.
Victims are lured into a fake Zoom or Google Meet call where they are prompted to execute commands that download the malware in the background, allowing attackers to bypass traditional controls without detection to gain access to credentials and corporate systems, the security researcher said in a Tuesday report.
Source: Cointelegraph →Related News
- 3 hours ago
Binance.US cuts spot trading fees to near zero in push to undercut rivals
- 3 hours ago
Aave deposits fall by $15B as Kelp exploit sparks flight from DeFi lender
- 3 hours ago
UK cracks down on illegal peer-to-peer crypto trading in nationwide raids
- 3 hours ago
Europe’s MiCA regime puts smaller crypto firms under pressure
- 4 hours ago
Russia advances crypto bill that could pave way for criminal penalties
