Connect with us
DAPA Banner

Crypto World

Lazarus-linked macOS malware targets crypto and fintech sectors

Published

on

Crypto Breaking News

Security researchers have linked a fresh macOS malware campaign to the Lazarus Group, the North Korea-linked hacking outfit responsible for some of the crypto sector’s most consequential losses. The campaign, tracked by researchers as the Mach-O Man kit, is deployed through the ClickFix social-engineering framework that targets a broad spectrum of firms, including crypto companies.

According to Mauro Eldritch, an offensive security expert and founder of threat-intelligence outfit BCA Ltd., the Mach-O Man campaign leverages convincing calls to lure victims into executing commands that quietly pull down the malware in the background. The tactic enables attackers to bypass conventional security controls and slip into credentials and broader corporate environments, a pattern documented in a Tuesday report that cites the Any.run macOS analysis sandbox as a primary source of insight.

The operation culminates in a stealer payload designed to harvest a wide range of sensitive data, from browser extension data and stored credentials to cookies and macOS Keychain entries. Once collected, the information is zipped and exfiltrated through Telegram, after which the toolkit performs a self-deletion routine using the system rm command to erase traces without requiring user confirmation.

The emergence of Mach-O Man fits into a broader narrative around Lazarus’ evolving targeting beyond purely crypto-native incidents, underscoring the risk to corporate networks and supply chains alike. The group has long been associated with some of the industry’s largest heists, including the $1.4 billion attack on the Bybit exchange in 2025, cited as the era’s largest cryptocurrency breach to date.

Advertisement

For context, researchers emphasize that Lazarus has continued to widen its toolkit and attack surface in recent months. In April, the group was tied to AI-enabled social-engineering campaigns that breached Zerion by gaining access to team members’ sessions, credentials and private keys. The Zerion incident illustrated how attackers can blend social engineering with credential theft to reach privileged accounts and sensitive assets. Further coverage on that event is available from Cointelegraph.

Key takeaways

  • Mach-O Man, a macOS malware kit attributed to Lazarus by researchers, is distributed via ClickFix social-engineering campaigns that reach traditional businesses and crypto firms alike.
  • The final payload acts as a stealer, extracting browser data, credentials, cookies and macOS Keychain entries, with data zipped and exfiltrated through Telegram before the kit self-destructs using rm to erase traces.
  • Victims are lured into fake Zoom or Google Meet calls, where they are prompted to run commands that trigger malware installation and deeper access, bypassing typical endpoint protections.
  • The Lazarus operation continues to broaden its target scope beyond crypto-native companies, aligning with broader industry observations of the group’s expanding playbook and infrastructure access.
  • Contextual benchmarks include the Bybit hack in 2025 and the Zerion breach in April, illustrating a pattern of high-stakes intrusions that blend phishing, social engineering and credential theft.

Mach-O Man: unraveling the attack sequence

At the core of the Mach-O Man campaign is a staged social-engineering flow centered on convincing calendar invites for popular virtual-meeting platforms. Victims receive a prompt that resembles a legitimate meeting notification, prompting them to join a so-called “Zoom” or “Google Meet” session. In the guise of a routine setup, victims are then steered to execute commands that quietly download and install the Mach-O Man components in the background. This stealthy delivery pathway helps attackers sidestep many traditional controls and allows credential harvesting to proceed with limited user friction.

Once the stealer is deployed, the toolkit targets data of high value to attackers. It raids browser extension data, stored credentials, cookies and Keychain entries, among other sensitive locally stored information. The extracted material is packaged into a zip archive and sent to the operators via Telegram, a channel chosen for its speed and relative resilience against standard enforcement actions. Following data exfiltration, the malware deploys a self-deletion routine, removing the entire kit from the host using the rm command—effectively leaving minimal traces and complicating post-incident forensics.

Context and implications for the crypto security landscape

The Lazarus Group’s alleged involvement in Mach-O Man extends a well-documented pattern of sophisticated, long-running campaigns that intensify the risk profile for crypto firms and their ecosystems. The group has become a persistent thorn in the side of exchanges, wallet providers and project teams, with past operations demonstrating a capacity to scale beyond traditional targets and adapt to evolving defense postures.

Bybit’s stunning $1.4 billion breach in 2025 stands as a benchmark for the scale of Lazarus-driven intrusions, underscoring not only the capital at risk but the potential for cascading effects across liquidity, market making and user trust. In parallel, the Zerion incident in April showcased how AI-augmented social engineering can accelerate the theft of credentials and private keys by exploiting legitimate team workflows and authorized sessions. The combination of social engineering with credential access remains among the most challenging vectors for defenders to preempt, particularly on macOS environments where threat actors have previously found gaps in application controls and user vigilance. Related reporting on Lazarus-linked activity continues to surface across industry coverage.

Advertisement

Defensive lessons and what to watch next

Mach-O Man reinforces the need for macOS-specific defense postures that blend user-education, application-control policies and robust-measurement of endpoint behavior. Key mitigations include enforcing least-privilege execution, deploying application allowlists, monitoring for anomalous download-and-execute sequences triggered from trusted apps, and tightening the wing of endpoint detection to catch command-and-control-like behaviors associated with staged infection chains. Given that the exfiltration route leverages Telegram, security teams should review outbound intelligence on uncommon channels used for data transfer and consider network-level constraints that challenge rapid egress of sensitive information.

For practitioners, the takeaway is clear: even as crypto-specific threats remain high-profile, attackers are expanding their targeting to encompass traditional businesses and cross-sector networks. This broadening of Lazarus’ reach increases the potential attack surface for exchanges, custodians and infrastructure providers alike, reinforcing the case for comprehensive, cross-platform threat intelligence integration and rapid response playbooks that can pivot as new malware kits surface. Any.run analysis provides a technical backdrop for understanding the Mach-O Man kit’s behavior and evolution.

As the industry absorbs these developments, observers will be watching for how defenders adapt to macOS-focused campaigns and whether new variants of Mach-O Man emerge with enhanced evasion techniques or more aggressive data-collection capabilities. The convergence of social engineering, credential theft and automated self-deletion marks a troubling trend—one that demands renewed emphasis on user education, secure access controls and vigilant incident-response strategies.

Readers should keep an eye on any updates about Lazarus’ tactics across platforms, especially as security teams track potential shifts in the group’s tooling, command channels and preferred data-exfiltration methods. The coming weeks may reveal whether Mach-O Man is a standalone spike or part of a broader, ongoing shift in the threat landscape facing the crypto ecosystem.

Advertisement

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Bitcoin DeFi pitched in $46 million proposal ask by Cardano team

Published

on

Bitcoin DeFi pitched in $46 million proposal ask by Cardano team

Input Output, the private engineering company that built and continues to develop the Cardano blockchain, is seeking about half the funding it requested last year from the project’s community treasury.

The company submitted nine proposals totaling $46.8 million for 2026 on Tuesday, down from $97.5 million in 2025. Several of the proposals focus on scaling Cardano to increase its transaction processing capacity and expanding into Bitcoin DeFi.

Cardano, like most major blockchains, maintains a shared pool of money funded by network fees, which community representatives vote to allocate toward development work. Input Output historically has been the largest recipient because it employs most of the engineers building the underlying software.

The reduced ask is the first concrete step in a plan to phase out that dependency. Input Output said it now aims to shrink its annual request each year until the company can sustain itself on its own revenue, with community funds going instead to a broader set of smaller engineering groups.

Advertisement

By the end of 2026, Input Output expects smaller, more specialized teams to take on most of the work it currently does in-house, including firms such as VacuumLabs and Midgard Labs that focus on specific layers of the Cardano software.

Scaling and bitcoin DeFi

The nine proposals group into two themes. The larger funds a consensus upgrade called Leios, which Input Output claims will increase Cardano’s transaction processing capacity by 10 to 65 times, targeting more than 1,000 transactions per second.

For context, that would move Cardano from a relatively slower chain to one competitive with Solana and the fastest Ethereum layer-2 networks on throughput alone. Leios is scheduled for a test release in June and full deployment by year-end.

The second flagship proposal funds a system called Pogun, which aims to bring Bitcoin-based decentralized finance to Cardano. In practice, it would let bitcoin holders borrow and earn yield on their holdings through Cardano without giving custody to a centralized intermediary. Pogun’s lending component is targeted for public release in the second quarter.

Advertisement

Smaller proposals cover performance improvements to Cardano’s smart contract engine, security testing infrastructure, developer tools, and expanded API services.

Each proposal names specific delivery leads and ties funding to delivery milestones rather than releasing money upfront. Imagine paying a contractor in stages as different parts of a house are completed, instead of handing over the full budget at the start of construction.

Voting opens Tuesday and runs through May 24. The decisions are made by roughly 1,000 elected delegates known as DReps, who represent ADA holders much as proxy representatives do in a publicly traded company. Charles Hoskinson, the founder of Input Output, is scheduled to release a video this week making the case directly to those delegates.

The vote will test whether Cardano’s governance, which has expanded significantly over the past two years, treats Input Output like any other grant applicant or continues to approve its requests largely on a basis of deference.

Advertisement

Last year’s $97.5 million proposal passed, but in the interim the Cardano Foundation has taken over the project’s grant-funding arm, and Intersect, the governance organization running this vote, has assumed stewardship of core Cardano software. Both shifts mean alternatives to Input Output now exist in a way they did not when previous votes went through.

Meanwhile, Input Output also cited progress in the ecosystem in its release. A new Cardano stablecoin, USDCx, reached 14.6 million tokens in circulation within weeks of its launch. Total assets deposited on Cardano, a common measure of a network’s usage, rose from $137.5 million to $142.7 million over the same period.

Whether the full slate passes, gets partially funded, or is reshaped entirely by DReps will signal how much the Cardano community’s thinking has shifted now that the tools to fund development without Input Output exist.

Source link

Advertisement
Continue Reading

Crypto World

Phishing, Deepfakes To Fuel 2026’s Biggest Crypto Hacks

Published

on

Phishing, Deepfakes To Fuel 2026's Biggest Crypto Hacks

Real-time deepfakes, phishing attacks, supply chain compromises and cross-chain vulnerabilities will likely be the root of some of the biggest hacks in 2026, according to CertiK senior blockchain investigator Natalie Newson.

The industry has already lost over $600 million to hacks in 2026, due largely to two North Korea-linked crypto thefts in April, including the $293 million Kelp DAO exploit on Saturday involving a single point-of-trust failure in cross-chain messaging protocol LayerZero’s infrastructure, and the $280 million exploit of the Drift Protocol.

Another DPRK-linked attack involved the use of AI for social engineering. Crypto wallet Zerion revealed on April 15 that North Korean-affiliated hackers used AI in a long-term social engineering attack to steal about $100,000 from the company’s hot wallets.

Newson warned that, in “some aspects,” the acceleration of AI will only worsen crypto attacks.

Advertisement
The average size of crypto hacks rose to $19.5 million in 2025. Source: TRM Labs

 “The best way for investors to protect themselves is to be aware of the current threats they may face… For instance, to protect yourself against phishing, always verify the authenticity of URLs and smart contracts,” Newson said.

Newson said that as exploits become more sophisticated, retail investors should explore storage options outside of crypto exchanges. 

“Using cold wallets can help keep assets that you don’t use regularly safe and allows you to sign transactions without ever exposing your private keys,” she said. 

AI could be used to defend against attacks

“There are now more convincing deepfakes, autonomous attack agents, and ‘agentic AI’ that can autonomously scan smart contracts for bugs, draft exploit code and execute attacks at machine speed,” she said.

On April 6, Cointelegraph reported that a threat actor known as “Jinkusu” was allegedly selling cybercrime tools designed to bypass Know Your Customer (KYC) checks at banks and crypto platforms, using deepfakes and voice manipulation.

Advertisement

“At the same time, AI can also be one of the biggest defenses,” said Newson. 

Cointelegraph recently reported that an increase in AI use has led to a flood of bug bounty submissions, both valid and invalid. Anthropic’s AI model Claude Mythos, claimed to have the ability to find vulnerabilities in major operating systems, has been deployed defensively with a release to a limited set of tech firms.

Regulators are escalating in response

CertiK shared with Cointelegraph in December 2025 that crypto hackers stole $3.3 billion in 2025. 

The company said supply-chain breaches emerged as the most damaging threat, accounting for $1.45 billion in losses across just two incidents, including the $1.4 billion Bybit hack in February 2025.

Advertisement

Related: Telegram CEO Durov warns EU age-verification app could enable wider tracking

“The Bybit exploit signals that well-capitalized, well-coordinated threat actors are becoming more active across the ecosystem,” the report said, predicting a rise in the “sophistication” of supply chain attacks as attackers target more infrastructure providers.

Regulators are responding. On April 9, the US Department of the Treasury’s Office of Cybersecurity and Critical Infrastructure Protection (OCCIP) announced on Thursday that it is expanding its cybersecurity threat identification program to include digital asset companies.

Magazine: Adam Back says current demand is ‘almost’ enough to send Bitcoin to $1M

Advertisement