Connect with us
DAPA Banner

Crypto World

Lazarus Group Uses Fake Meeting Hack

Published

on

Lazarus Group Uses Fake Meeting Hack

North Korea’s Lazarus Group has launched a new macOS malware campaign called Mach-O Man that uses fake online meeting invitations to trick crypto and fintech executives into executing malicious commands on their own devices, according to blockchain security firm CertiK.

Summary

  • Lazarus Group’s new Mach-O Man campaign uses fake meeting invites to lure executives into pasting malicious terminal commands on their Macs.
  • The malware auto-deletes after execution, making the breach nearly impossible to detect through standard forensic methods.
  • CertiK links the same Lazarus push to over $500 million stolen from DeFi platforms Drift and KelpDAO in the past two weeks.

North Korea’s Lazarus Group is running a new campaign dubbed Mach-O Man that targets executives at crypto, fintech, and other high-value firms by disguising malware delivery as a routine technical fix during a fake business meeting, according to CertiK senior blockchain security researcher Natalie Newson. The campaign was disclosed on April 22 and represents one of the group’s most operationally sophisticated social engineering methods to date.

Lazarus Group Crypto Hack Hides Behind Routine Business Communications

The attack chain begins with an urgent-looking meeting invitation sent over Telegram, impersonating a Zoom, Microsoft Teams, or Google Meet call. The link leads to a convincing but fake website that tells the victim to paste a single command into their Mac terminal to resolve an apparent connection issue, a technique CertiK identifies as ClickFix. Once executed, the command installs a modular malware kit built from native Mach-O binaries tailored for Apple environments, which profiles the host, establishes persistence, and exfiltrates credentials and browser data through a Telegram-based command-and-control channel. Critically, the toolkit auto-deletes after completing its task, making detection and forensic analysis extremely difficult. “These fake verification steps guide victims through keyboard shortcuts that run a harmful command,” CertiK’s Newson told CoinDesk. “The page looks real, the instructions seem normal, and the victim initiates the action themselves, which is why traditional security controls often miss it.”

Advertisement

Why This Attack Is Harder to Catch Than Standard Phishing

Unlike traditional phishing attacks that rely on urgency cues or suspicious sender addresses, the Mach-O Man campaign is designed to look entirely routine at the moment of delivery. Executives in crypto and fintech routinely receive cold outreach from investors, researchers, and business partners, making the fake meeting invitation format a credible lure in a way that generalized phishing often is not. CertiK’s analysis notes that the Mach-O Man framework is tied to Lazarus’ Famous Chollima unit and distributed through compromised Telegram accounts specifically targeting high-value organizations in the digital asset space. Most victims will not realize they have been compromised until well after the malware has erased itself. “They likely don’t know it yet,” Newson said. “If they do, they probably can’t identify which variant affected them.”

The Scale of the Lazarus Threat to Crypto in 2026

CertiK has linked the Mach-O Man campaign to a broader Lazarus offensive that has siphoned more than $500 million from DeFi platforms Drift and KelpDAO in under two weeks, adding to a cumulative theft total estimated at $6.7 billion since 2017. The United Nations has previously estimated that North Korean hackers have stolen several billion dollars in digital assets to fund the country’s weapons programs. “What makes Lazarus especially dangerous right now is their activity level,” Newson said. “This isn’t random hacking. It’s a state-directed financial operation running at a scale and speed typical of institutions.” CertiK is advising crypto professionals to independently verify all meeting requests through a separate channel before clicking any link or downloading any attachment from an unsolicited invitation.

CertiK has shared indicators of compromise tied to the Mach-O Man campaign with the broader security community to support detection and defense efforts across the industry.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Kalshi Bans 3 US Candidates Over Insider Bets on Elections

Published

on

Kalshi Bans 3 US Candidates Over Insider Bets on Elections

Two US congressional candidates and one sitting lawmaker have received fines and bans from Kalshi after they were found betting on the outcomes of their election races, as prediction market platforms crack down on insider trading.

Matt Klein, a sitting member of the Minnesota State Senate, was fined $539 for betting on his primary race in his bid for the US House of Representatives, which is set to take place in August. Ezekiel Enriquez, who ran for a US House seat in March, received a $784 penalty, according to Kalshi’s notice of settlement.

Another case involved Mark Moran, a candidate in Virginia’s US Senate race, who received a $6,229 penalty and was ordered to return any profits from his trades after allegedly refusing to cooperate with Kalshi to resolve the issue. All three were banned from the platform for five years.

Prediction markets, which let users trade contracts on the outcomes of future events, have faced growing scrutiny over insider trading and possible violations of gambling laws. Kalshi and Polymarket, the two largest platforms, have pledged to introduce stricter controls and crack down on unlawful activity.

Advertisement

Lawmakers offer reasons for insider trades

Moran said in a statement on X that he placed his wager to test Kalshi’s procedures and see how the platform would respond to insider trading.

“YES, I did bet ~$100 on myself on Kalshi because I wanted to get caught,” he said, adding that he “wanted to see (1) if Kalshi would come after me and (2) what their path would be.”

Source: Mark Moran

Klein said in a statement that he placed the wager out of curiosity about how prediction markets worked, but later learned it violated platform rules.

“In compliance with their request, I paid a penalty and agreed to be suspended from the platform. That was the only wager I have ever made on a predictions market,” he added.

Klein is a co-sponsor of a bill in the Minnesota Legislature that aims to ban wagers on the outcomes of real-world events such as elections or policy decisions.

Advertisement

Cointelegraph was unable to reach Ezekiel Enriquez for comment.

Kalshi’s ongoing insider trading crack down

Bobby DeNault, Kalshi’s head of enforcement, said Tuesday these cases violated Kalshi’s exchange rules but didn’t warrant referral to the US Commodity Futures Trading Commission or the Department of Justice for further investigation and prosecution.

Related: Charles Schwab, Citadel Securities are eying prediction markets

“Regardless of the size of a trade, political candidates who can influence a market based on whether they stay in or out of a race violate our rules. No matter how small the size of the trade, any trade that is found to have violated our exchange rules will be punished,” he added.

Advertisement

The platform issued a $2,000 fine and a five-year ban in February to a former California gubernatorial contender for betting on his own candidacy last year.

Magazine: How to fix suspected insider trading on Polymarket and Kalshi