Connect with us
DAPA Banner

Crypto World

Lazarus Group Uses Fake Meeting Hack

Published

on

Lazarus Group Uses Fake Meeting Hack

North Korea’s Lazarus Group has launched a new macOS malware campaign called Mach-O Man that uses fake online meeting invitations to trick crypto and fintech executives into executing malicious commands on their own devices, according to blockchain security firm CertiK.

Summary

  • Lazarus Group’s new Mach-O Man campaign uses fake meeting invites to lure executives into pasting malicious terminal commands on their Macs.
  • The malware auto-deletes after execution, making the breach nearly impossible to detect through standard forensic methods.
  • CertiK links the same Lazarus push to over $500 million stolen from DeFi platforms Drift and KelpDAO in the past two weeks.

North Korea’s Lazarus Group is running a new campaign dubbed Mach-O Man that targets executives at crypto, fintech, and other high-value firms by disguising malware delivery as a routine technical fix during a fake business meeting, according to CertiK senior blockchain security researcher Natalie Newson. The campaign was disclosed on April 22 and represents one of the group’s most operationally sophisticated social engineering methods to date.

Lazarus Group Crypto Hack Hides Behind Routine Business Communications

The attack chain begins with an urgent-looking meeting invitation sent over Telegram, impersonating a Zoom, Microsoft Teams, or Google Meet call. The link leads to a convincing but fake website that tells the victim to paste a single command into their Mac terminal to resolve an apparent connection issue, a technique CertiK identifies as ClickFix. Once executed, the command installs a modular malware kit built from native Mach-O binaries tailored for Apple environments, which profiles the host, establishes persistence, and exfiltrates credentials and browser data through a Telegram-based command-and-control channel. Critically, the toolkit auto-deletes after completing its task, making detection and forensic analysis extremely difficult. “These fake verification steps guide victims through keyboard shortcuts that run a harmful command,” CertiK’s Newson told CoinDesk. “The page looks real, the instructions seem normal, and the victim initiates the action themselves, which is why traditional security controls often miss it.”

Advertisement

Why This Attack Is Harder to Catch Than Standard Phishing

Unlike traditional phishing attacks that rely on urgency cues or suspicious sender addresses, the Mach-O Man campaign is designed to look entirely routine at the moment of delivery. Executives in crypto and fintech routinely receive cold outreach from investors, researchers, and business partners, making the fake meeting invitation format a credible lure in a way that generalized phishing often is not. CertiK’s analysis notes that the Mach-O Man framework is tied to Lazarus’ Famous Chollima unit and distributed through compromised Telegram accounts specifically targeting high-value organizations in the digital asset space. Most victims will not realize they have been compromised until well after the malware has erased itself. “They likely don’t know it yet,” Newson said. “If they do, they probably can’t identify which variant affected them.”

The Scale of the Lazarus Threat to Crypto in 2026

CertiK has linked the Mach-O Man campaign to a broader Lazarus offensive that has siphoned more than $500 million from DeFi platforms Drift and KelpDAO in under two weeks, adding to a cumulative theft total estimated at $6.7 billion since 2017. The United Nations has previously estimated that North Korean hackers have stolen several billion dollars in digital assets to fund the country’s weapons programs. “What makes Lazarus especially dangerous right now is their activity level,” Newson said. “This isn’t random hacking. It’s a state-directed financial operation running at a scale and speed typical of institutions.” CertiK is advising crypto professionals to independently verify all meeting requests through a separate channel before clicking any link or downloading any attachment from an unsolicited invitation.

CertiK has shared indicators of compromise tied to the Mach-O Man campaign with the broader security community to support detection and defense efforts across the industry.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

UK FCA Targets Illegal Crypto P2P Trading in Nationwide Raids

Published

on

UK FCA Targets Illegal Crypto P2P Trading in Nationwide Raids

The United Kingdom’s Financial Conduct Authority (FCA) has raided multiple sites suspected of running illegal peer-to-peer (P2P) crypto trading operations.

The financial services and markets watchdog said Wednesday that it worked alongside HM Revenue & Customs and the South West Regional Organised Crime Unit to inspect eight locations linked to illegal crypto trading. Officials issued cease-and-desist notices on site, ordering operators to halt activity immediately, while gathering evidence tied to ongoing criminal investigations.

“Unregistered peer-to-peer crypto traders operating in the UK are doing so illegally and pose a financial crime risk,” Steve Smart, the FCA’s executive director of enforcement and market oversight, said.

P2P crypto trading allows individuals to buy and sell digital assets directly, bypassing centralized exchanges. In the UK, such activity requires registration under anti-money laundering rules. The FCA said no peer-to-peer crypto traders or platforms are currently registered with the regulator.

Advertisement

Related: Stratiphy reopens tax-free route to crypto ETNs for UK investors

FCA expands crypto crackdown

The raids mark the FCA’s first operation of this kind focused on P2P crypto trading, but follow a series of enforcement steps against the sector. Previous actions include prosecutions tied to illegal crypto ATM networks and arrests linked to unlicensed exchanges.

Earlier this month, authorities in the UK and other countries, including the US and Canada, froze millions of dollars linked to crypto scams as part of a coordinated enforcement effort called Operation Atlantic. The operation, carried out in March, was led by agencies including the UK’s National Crime Agency, the US Secret Service and Canadian law enforcement and securities regulators.

Source: NCA

Officials said the operation identified more than 20,000 victims across the three countries and secured over $12 million in suspected criminal proceeds. Investigators also traced more than $45 million in additional stolen crypto linked to fraud networks.

“These raids mark a shift under the incoming FSMA crypto regime, unregistered OTC desks are no longer an AML-registration gap, they’re an unauthorised regulated activity, and enforcement will look more like traditional finance,” Slav Demchuk, CEO at AMLBot.com, told Cointelegraph.

Advertisement

He added that unregulated OTC brokers are one of the most consistent chokepoints in illicit flows, including “Iran-linked evasion corridors where actors cut off from regulated exchanges use informal desks to move USDT and BTC in and out of fiat.”

Related: UK plans payments rule changes for stablecoins, tokenized deposits

UK FCA pushes ahead with crypto rulebook

Earlier this month, the FCA opened a consultation on guidance for its upcoming crypto regulatory regime, which is expected to take effect in 2027. The guidance will cover key areas including stablecoins, trading platforms, custody and staking.

Companies are expected to be able to apply for authorization from September 2026, with full compliance required once the framework is implemented.

Advertisement

Magazine: Singapore isn’t a ‘crypto hub’ — it’s something better: StraitsX CEO