No connection

Search Results

Crypto Score 65 Bearish

North Korean Lazarus Group Deploys 'Mach-O Man' Malware Targeting Crypto Executives

Apr 22, 2026 12:20 UTC
Immediate term

A sophisticated new macOS malware campaign is targeting high-value fintech and cryptocurrency targets through advanced social engineering. The state-sponsored group has reportedly siphoned over $500 million in recent weeks.

  • Lazarus Group's 'Mach-O Man' targets macOS via 'ClickFix' social engineering
  • Recent exploits of Drift and KelpDAO resulted in $500 million in losses
  • Attackers use fake meeting invites to trick executives into running terminal commands
  • The malware is modular and designed to self-delete to avoid detection
  • Total estimated thefts by the group since 2017 reach $6.7 billion

The North Korean state-run Lazarus Group has launched a high-intensity campaign dubbed 'Mach-O Man,' designed to infiltrate corporate systems and steal credentials from fintech and cryptocurrency executives. Security experts from CertiK warn that the group is operating with institutional speed and scale, treating crypto theft as a national industry. In the past fortnight alone, the collective has reportedly stolen more than $500 million via exploits targeting Drift and KelpDAO. This activity is part of a broader pattern of state-directed financial operations, with the group's cumulative loot estimated at $6.7 billion since 2017. The attack utilizes a delivery method known as 'ClickFix.' Attackers send urgent meeting invites via Telegram for platforms such as Zoom, Microsoft Teams, or Google Meet. Victims are directed to a fraudulent website that prompts them to copy and paste a specific command into their Mac terminal to 'fix' a simulated connection issue. By executing this command, victims grant the hackers immediate access to corporate systems, SaaS platforms, and financial resources. The malware, developed by the Chollima division, uses native Mach-O binaries tailored for Apple environments. Because the victim manually initiates the action, traditional security controls often fail to detect the breach. Furthermore, the malware is designed to erase itself after the exploit is complete, often leaving victims unaware of the compromise until the financial damage is already done.

Sign up free to read the full analysis

Create a free account to unlock full AI-curated market articles, personalized alerts, and more.

Share this article

Stay Ahead of the Markets

Join thousands of traders using AI-powered market intelligence. Get personalized insights, real-time alerts, and advanced analysis tools.

Home
Terminal
AI
Markets
Profile