North Korea–linked hacking outfit Lazarus Group is pushing a new native macOS malware kit security researchers call “Mach-O Man.” Lazarus built the toolkit with several Go‑based Mach-O binaries and designed it to run smoothly on modern Apple Silicon machines used by developers and executives. Researchers say the campaign focuses on high‑value corporate environments in fintech, crypto, and other finance‑adjacent sectors.
The kit is the center of an ongoing intrusion effort that seeks to obtain deep access to business systems and steal credentials, according to a technical article published by the Quetzal Team. It collects browser sessions, tokens that open internal tools or cloud dashboards, and passwords kept in the macOS Keychain. As a result, an attacker can gain access to trading desks through a compromised Mac.
Social Engineering Starts with “Urgent” Meeting Invites
The Mach-O Man playbook begins with social engineering instead of obvious phishing emails. Attackers send targets “urgent” invitations on apps like Telegram for a Zoom, Google Meet, or Teams call and then direct them to a fake meeting‑related website. There, the site claims there is a connection problem and tells the victim to paste a one‑line command into the macOS Terminal to “fix” it.
By running that command directly, users successfully install the malware and allow it to circumvent several company security safeguards. The kit then downloads more payloads, creates persistence, and begins silently stealing data from the device. Analysts warn that this technique may avoid detection by traditional endpoint technologies since it uses native binaries and user-initiated actions instead of obvious exploit chains.
Why Crypto and Fintech Should Pay Attention
Lazarus has a long track record of targeting cryptocurrency businesses, including past AppleJeus campaigns that abused fake trading apps to compromise exchanges. Analysts believe the group stole hundreds of millions of dollars in digital assets in earlier years through a mix of exchange hacks and supply‑chain attacks. The new Mach-O Man toolkit shows the group is still investing in macOS malware as more executives and engineers use Macs for work.
Researchers say organizations with hot‑wallet access, signing keys, or large balances face the highest risk, since stolen credentials or browser sessions could let attackers move funds, change withdrawal settings, or pivot into back‑office infrastructure without touching onchain defenses.Security teams in crypto, trading, and payments should lock down macOS endpoints, restrict Terminal use, and monitor for suspicious Go‑based Mach-O binaries.
READ MORE: BitMine Stock is On the Cusp of a Surge as Tom Lee Nears the 5% Mark