Connect with us
DAPA Banner

Crypto World

Lazarus-linked macOS malware targets crypto and fintech sectors

Published

on

Crypto Breaking News

Security researchers have linked a fresh macOS malware campaign to the Lazarus Group, the North Korea-linked hacking outfit responsible for some of the crypto sector’s most consequential losses. The campaign, tracked by researchers as the Mach-O Man kit, is deployed through the ClickFix social-engineering framework that targets a broad spectrum of firms, including crypto companies.

According to Mauro Eldritch, an offensive security expert and founder of threat-intelligence outfit BCA Ltd., the Mach-O Man campaign leverages convincing calls to lure victims into executing commands that quietly pull down the malware in the background. The tactic enables attackers to bypass conventional security controls and slip into credentials and broader corporate environments, a pattern documented in a Tuesday report that cites the Any.run macOS analysis sandbox as a primary source of insight.

The operation culminates in a stealer payload designed to harvest a wide range of sensitive data, from browser extension data and stored credentials to cookies and macOS Keychain entries. Once collected, the information is zipped and exfiltrated through Telegram, after which the toolkit performs a self-deletion routine using the system rm command to erase traces without requiring user confirmation.

The emergence of Mach-O Man fits into a broader narrative around Lazarus’ evolving targeting beyond purely crypto-native incidents, underscoring the risk to corporate networks and supply chains alike. The group has long been associated with some of the industry’s largest heists, including the $1.4 billion attack on the Bybit exchange in 2025, cited as the era’s largest cryptocurrency breach to date.

Advertisement

For context, researchers emphasize that Lazarus has continued to widen its toolkit and attack surface in recent months. In April, the group was tied to AI-enabled social-engineering campaigns that breached Zerion by gaining access to team members’ sessions, credentials and private keys. The Zerion incident illustrated how attackers can blend social engineering with credential theft to reach privileged accounts and sensitive assets. Further coverage on that event is available from Cointelegraph.

Key takeaways

  • Mach-O Man, a macOS malware kit attributed to Lazarus by researchers, is distributed via ClickFix social-engineering campaigns that reach traditional businesses and crypto firms alike.
  • The final payload acts as a stealer, extracting browser data, credentials, cookies and macOS Keychain entries, with data zipped and exfiltrated through Telegram before the kit self-destructs using rm to erase traces.
  • Victims are lured into fake Zoom or Google Meet calls, where they are prompted to run commands that trigger malware installation and deeper access, bypassing typical endpoint protections.
  • The Lazarus operation continues to broaden its target scope beyond crypto-native companies, aligning with broader industry observations of the group’s expanding playbook and infrastructure access.
  • Contextual benchmarks include the Bybit hack in 2025 and the Zerion breach in April, illustrating a pattern of high-stakes intrusions that blend phishing, social engineering and credential theft.

Mach-O Man: unraveling the attack sequence

At the core of the Mach-O Man campaign is a staged social-engineering flow centered on convincing calendar invites for popular virtual-meeting platforms. Victims receive a prompt that resembles a legitimate meeting notification, prompting them to join a so-called “Zoom” or “Google Meet” session. In the guise of a routine setup, victims are then steered to execute commands that quietly download and install the Mach-O Man components in the background. This stealthy delivery pathway helps attackers sidestep many traditional controls and allows credential harvesting to proceed with limited user friction.

Once the stealer is deployed, the toolkit targets data of high value to attackers. It raids browser extension data, stored credentials, cookies and Keychain entries, among other sensitive locally stored information. The extracted material is packaged into a zip archive and sent to the operators via Telegram, a channel chosen for its speed and relative resilience against standard enforcement actions. Following data exfiltration, the malware deploys a self-deletion routine, removing the entire kit from the host using the rm command—effectively leaving minimal traces and complicating post-incident forensics.

Context and implications for the crypto security landscape

The Lazarus Group’s alleged involvement in Mach-O Man extends a well-documented pattern of sophisticated, long-running campaigns that intensify the risk profile for crypto firms and their ecosystems. The group has become a persistent thorn in the side of exchanges, wallet providers and project teams, with past operations demonstrating a capacity to scale beyond traditional targets and adapt to evolving defense postures.

Bybit’s stunning $1.4 billion breach in 2025 stands as a benchmark for the scale of Lazarus-driven intrusions, underscoring not only the capital at risk but the potential for cascading effects across liquidity, market making and user trust. In parallel, the Zerion incident in April showcased how AI-augmented social engineering can accelerate the theft of credentials and private keys by exploiting legitimate team workflows and authorized sessions. The combination of social engineering with credential access remains among the most challenging vectors for defenders to preempt, particularly on macOS environments where threat actors have previously found gaps in application controls and user vigilance. Related reporting on Lazarus-linked activity continues to surface across industry coverage.

Advertisement

Defensive lessons and what to watch next

Mach-O Man reinforces the need for macOS-specific defense postures that blend user-education, application-control policies and robust-measurement of endpoint behavior. Key mitigations include enforcing least-privilege execution, deploying application allowlists, monitoring for anomalous download-and-execute sequences triggered from trusted apps, and tightening the wing of endpoint detection to catch command-and-control-like behaviors associated with staged infection chains. Given that the exfiltration route leverages Telegram, security teams should review outbound intelligence on uncommon channels used for data transfer and consider network-level constraints that challenge rapid egress of sensitive information.

For practitioners, the takeaway is clear: even as crypto-specific threats remain high-profile, attackers are expanding their targeting to encompass traditional businesses and cross-sector networks. This broadening of Lazarus’ reach increases the potential attack surface for exchanges, custodians and infrastructure providers alike, reinforcing the case for comprehensive, cross-platform threat intelligence integration and rapid response playbooks that can pivot as new malware kits surface. Any.run analysis provides a technical backdrop for understanding the Mach-O Man kit’s behavior and evolution.

As the industry absorbs these developments, observers will be watching for how defenders adapt to macOS-focused campaigns and whether new variants of Mach-O Man emerge with enhanced evasion techniques or more aggressive data-collection capabilities. The convergence of social engineering, credential theft and automated self-deletion marks a troubling trend—one that demands renewed emphasis on user education, secure access controls and vigilant incident-response strategies.

Readers should keep an eye on any updates about Lazarus’ tactics across platforms, especially as security teams track potential shifts in the group’s tooling, command channels and preferred data-exfiltration methods. The coming weeks may reveal whether Mach-O Man is a standalone spike or part of a broader, ongoing shift in the threat landscape facing the crypto ecosystem.

Advertisement

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

DOJ Charges SPLC With Fraud

Published

on

Texas AG Sues ActBlue for Fraud

The US Department of Justice has filed fraud charges against the Southern Poverty Law Center, alleging the civil rights organization made secret payments to extremist informants without proper disclosure.

Summary

  • The DOJ charged the SPLC with fraud, alleging undisclosed payments were made to informants embedded in extremist groups.
  • The charges represent one of the most significant legal actions ever taken against a major US civil rights organization.
  • The SPLC has not yet issued a detailed public response to the allegations.

The US Department of Justice announced a federal indictment against the Southern Poverty Law Center on April 21, with acting Attorney General Todd Blanche alleging the group had been paying informants embedded inside white supremacist and other extremist organizations while concealing those payments from donors. The indictment, returned by a grand jury in Alabama, includes six counts of wire fraud, four counts of making false statements to a federally insured bank, and one count of conspiracy to commit money laundering.

DOJ SPLC Fraud Charges Shake the Civil Rights World

According to prosecutors, the SPLC secretly paid leaders and organizers of groups including the Ku Klux Klan, the Aryan Nation, and the National Alliance, using shell accounts under fictitious names to funnel the money and avoid detection. NPR reported that one informant who was a member of the neo-Nazi National Alliance received more than $1 million in payments between 2014 and 2023, while another allegedly helped coordinate transportation to the deadly 2017 Unite the Right rally in Charlottesville and was paid approximately $270,000. “As the indictment describes, the SPLC was not dismantling these groups. It was instead manufacturing the extremism it purports to oppose by paying sources to stoke racial hatred,” Blanche said at a press conference announcing the charges.

Advertisement

What the Charges Allege

The DOJ alleges the SPLC used funds in ways inconsistent with its stated nonprofit mission and that the organization failed to maintain adequate records of payments made to informants, according to NBC News which covered the charges in detail. Prosecutors have not specified the total amount allegedly involved, but the case centers on a pattern of payments rather than a single transaction. The SPLC has disputed elements of the government’s account but has not issued a comprehensive public defense as of the time of publication.

Broader Implications for Nonprofits and Civil Rights Groups

The charges are being closely watched across the nonprofit sector, where organizations that engage in undercover monitoring of extremist groups often walk a legal and ethical line in how they fund and manage informants. NPR reported that the case could set a precedent for how civil rights organizations document and disclose intelligence-gathering activities going forward. For the SPLC, which has an endowment of several hundred million dollars and significant political influence, the legal battle ahead carries both financial and reputational stakes.

The DOJ has not indicated whether additional individuals within the SPLC’s leadership structure face charges, but the investigation is described as ongoing.

Advertisement

Source link

Continue Reading

Crypto World

ABTC Energizes More Than 11,000 New Bitcoin Mining Rigs

Published

on

Mining, Bitcoin Mining, Companies

American Bitcoin (ABTC), a publicly traded mining company co-founded by United States President Donald Trump’s sons, has completed its energization of 11,298 application-specific integrated circuits (ASICs) at its Drumheller site in Alberta, Canada.

Following the acquisition of machines, the company now owns about 89,242 ASICs, the computers used to mine Bitcoin (BTC) and other proof-of-work (PoW) cryptocurrencies, according to the company’s announcement on Wednesday.

ABTC’s mining fleet now generates a total of about 28.1 exahashes per second (EH/s) of computing power, operating at an “average efficiency” of 16 joules per terahash, the company said.

Shares of ABTC surged by about 11.7% on Wednesday, rising to about $1.38 per share, according to data from Yahoo Finance.

Advertisement
Mining, Bitcoin Mining, Companies
ABTC’s share price surged following the announcement. Source: Yahoo Finance

The announcement followed a tough business quarter for the company, which posted a loss of $59.5 million in the fourth quarter of 2025, as the mining industry grapples with multiple economic challenges that are chipping away at revenue.

Related: Aluminum giant Alcoa to sell dormant smelter to Bitcoin miner NYDIG: Report

ABTC struggles amid challenging business environment for miners

Mining companies are grappling with reduced block rewards since the April 2024 halving, rising energy costs, and declining crypto prices from the ongoing crypto bear market.

The price of BTC declined by over 50%, reaching a low of about $60,000 in February, when ABTC filed its Q4 results with the United States Securities and Exchange Commission (SEC).

ABTC attributed its Q4 losses to a $227.1 million decline in the fair value of its BTC holdings as a result of the crash, but said it was able to “mine BTC at a 53% discount” to prices on the spot market.

Advertisement
Mining, Bitcoin Mining, Companies
American Bitcoin’s total reserve holdings of Bitcoin and Satoshis, the smallest unit of BTC, per share. Source: Company filing

Public BTC mining companies sold more BTC in the first three months of 2026 than all of 2025. 

Mining companies MARA, CleanSpark, Riot, Cango, Core Scientific and Bitdeer collectively sold about 32,000 BTC in Q1, according to TheEnergyMag.

Sales in the period topped the previous record of 20,000 BTC sold by public mining companies during Q2 2022.

Magazine: AI may already use more power than Bitcoin — and it threatens Bitcoin mining