Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Lazarus Targets macOS: A Fake Zoom Link Attempting to Drain Cryptocurrency Firms' Executives.

CN
深潮TechFlow
Follow
3 hours ago
AI summarizes in 5 seconds.
Lazarus is indeed the mastermind behind the $1.4 billion theft incident at Bybit in 2025.

Author: Zoltan Vardai

Compiled by: Deep Tide TechFlow

Deep Tide Introduction: Security researchers have discovered that the North Korean hacker organization Lazarus is using a new macOS malware called "Mach-O Man" to target executives of cryptocurrency firms and traditional financial companies through fake Zoom and Google Meet meeting links. Victims are induced to execute commands, after which the malware steals sensitive data such as browser credentials and Keychain passwords in the background, ultimately transmitting it via Telegram. Lazarus is indeed the mastermind behind the $1.4 billion theft incident at Bybit in 2025.

Security researchers have linked a new macOS malware activity to the Lazarus Group. Lazarus is a North Korean-associated hacking organization, responsible for some of the largest thefts in the cryptocurrency industry.

Mauro Eldritch, founder of the threat intelligence company BCA Ltd and an attack security expert, revealed this new malware toolkit named "Mach-O Man" on Tuesday. It spreads through ClickFix social engineering methods, targeting traditional businesses and cryptocurrency companies.

Attack Path: Fake Zoom Meeting → Backdoor Installation

The specific method works like this: victims are lured into joining a fake Zoom or Google Meet video call, and the page prompts them to execute a command. Once executed, the malware completes the download in the background, bypassing traditional security controls and triggering no alarms, directly obtaining your credentials and enterprise system permissions.

Eldritch noted in a report released on Tuesday that this attack could lead to account takeover, unauthorized infrastructure access, financial loss, and critical data leaks. The scope of Lazarus's attacks has expanded beyond cryptocurrency-native companies.

The Lazarus Group is a primary suspect in several of the largest cryptocurrency hacking incidents in history, including the 2025 $1.4 billion theft from Bybit exchange, which remains the largest single theft in the industry.

image

Figure caption: Fake Mach-O Man toolkit application interface

Source: ANY.RUN

Ultimate Goal: Steal Everything in Browser and Keychain

The final stage of the attack chain is a stealer program, specifically designed to extract browser extension data, saved browser credentials, cookies, macOS Keychain entries, and other sensitive information.

image

Figure caption: Final deployment directory structure of the stealer program

Source: ANY.RUN

Once the data collection is complete, the malware packages everything into a zip file and sends it to the attacker via Telegram. Finally, the malware's self-destruct script uses the system's rm command to delete the entire toolkit, a command that skips user confirmation and permission checks, forcibly deleting files without leaving traces.

This new malware toolkit was reconstructed by security experts using ANY.RUN's cloud macOS malware sandbox analysis capabilities.

North Korean Hacker Attack Surface Continues to Expand

Earlier this April, North Korean hackers stole approximately $100,000 from the cryptocurrency wallet Zerion using AI-driven social engineering techniques. The attackers gained access to logged-in sessions, credentials, and company private keys of some team members.

Additionally, CZ recently issued a warning that the security team "SEAL" discovered 60 infiltrators posing as IT workers associated with North Korea within cryptocurrency companies.

The infiltration of the North Korean hacking scene into the cryptocurrency industry is no longer just a simple "hacking attack." From posing as employees to AI social engineering and customized malware, the attack surface continues to expand. macOS users have always been considered relatively safe, but Lazarus clearly disagrees.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by 深潮TechFlow

1 hour ago
From RWA to AI Agent: How does HashKey Chain build the next generation of on-chain financial infrastructure?
2 hours ago
Exclusive Interview with Arbitrum Committee Member: Why Did We Use "God Mode" to Freeze $72 Million of North Korean Hackers?
2 hours ago
AI "Transfer Station" earns a million a month? Five questions uncover the truth of Token arbitrage.
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarPANews
2 minutes ago
广东一女大学生赴泰泼水节遭诱骗疑被卖至电诈园区,索要3万U币赎金
avatar
avatarPANews
4 minutes ago
OpenBuild x Aleo Bootcamp: Unlock ZK Programmable Privacy, Build Next-Generation Web3 Privacy Applications in 4 Weeks
avatar
avatarOdaily星球日报
11 minutes ago
$500 to be a "shareholder" in Silicon Valley? Analyzing Naval's new fund USVC.
avatar
avatarPANews
14 minutes ago
An address invested 7 million US dollars to purchase 3,000 ETH.
avatar
avatarPANews
34 minutes ago
Over a hundred cryptocurrency companies in the United States jointly urge the Senate to advance the Clarity Act.
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink