A modern office with large windows, city skyline
Crypto

Researchers link “Mach-O Man” macOS stealer to Lazarus campaign hitting crypto firms

The kit uses fake Zoom and Google Meet lures plus ClickFix commands to steal Keychain and browser data, then exfiltrates via Telegram.

By AI Newsbot5 min read

Security researchers tied a newly identified macOS malware kit dubbed “Mach-O Man” to a Lazarus-linked campaign targeting staff at crypto and fintech firms, alongside traditional businesses. The operation relies on fake video meeting invites and ClickFix-style prompts to trick victims into running commands that install credential-stealing malware.

Key Takeaways

  • A new macOS malware kit dubbed “Mach-O Man” has been linked to a Lazarus Group campaign targeting crypto and fintech firms, as well as traditional businesses.
  • The infection chain uses fake Zoom or Google Meet calls and ClickFix-style prompts that push victims to run commands that pull malware in the background.
  • The final payload is a stealer built to extract browser extension data, saved credentials, cookies, and macOS Keychain entries.
  • Stolen data is zipped and sent out via Telegram, after which the malware runs a self-deletion routine using the system “rm” command.

Lazarus-Linked “Mach-O Man” Targets macOS Users at Crypto and Fintech Firms

A Lazarus-linked campaign is circulating a new macOS malware kit dubbed “Mach-O Man,” with targeting that includes crypto companies, fintech firms, and non-crypto businesses. The activity was flagged on a Tuesday in a report by Mauro Eldritch, an offensive security expert and founder of threat intelligence company BCA Ltd, though the excerpted material does not specify the exact calendar date.

For market participants, the Lazarus label matters because the group is associated with some of the largest thefts in the sector. It has been described as the main suspect in the $1.4 billion Bybit exchange hack in 2025, cited as the industry’s largest so far. That history tends to compress reaction time inside crypto orgs, even when a new campaign is “only” an endpoint stealer, because the downstream path often runs through credentials, sessions, and operational access.

Fake Zoom/Meet Invites and ClickFix Commands: How the Infection Happens

The tradecraft is built around user-driven execution rather than a loud exploit chain. Targets are lured into a fake Zoom or Google Meet call and then prompted to execute commands that download the malware in the background. Eldritch described the flow as enabling attackers to bypass traditional controls “without detection” while gaining access to credentials and corporate systems.

That matters because it shifts the weak point from patch cadence to human workflow. A ClickFix prompt is designed to look like a routine “fix” or setup step. If a victim runs the command, the attacker gets code execution on a macOS endpoint that likely already has access to internal tools, password managers, browser sessions, and corporate single sign-on.

What the Stealer Grabs—and How Telegram Exfiltration and Self-Deletion Work

The final-stage payload is a stealer focused on the artifacts that translate fastest into access: browser extension data, stored browser credentials, cookies, macOS Keychain entries, and other sensitive information. In crypto and fintech environments, those stores can map directly to account takeover risk, including session hijacking and privileged access paths that do not require immediate on-chain movement to be damaging.

After collection, the malware archives the stolen data into a zip file and exfiltrates it via Telegram. It then runs a self-deletion script that removes the kit using the system “rm” command, described as bypassing user confirmation and permissions when removing files. The combination of fast exfiltration plus cleanup behavior points to an operator priority of getting data out quickly and reducing forensic residue once the grab is complete.

The kit was reconstructed using Any.run’s cloud-based macOS analysis capabilities, providing a clearer view of the staging and collection behavior.

Signals to Monitor After the “Mach-O Man” Disclosure

The first signal is whether additional security firms publish independent technical indicators that corroborate the Lazarus attribution and allow defenders to hunt consistently across fleets. Without broader IOC sharing, the market is left with a credible narrative but limited cross-validation.

The second is evidence of follow-on intrusions that match the stealer’s haul, including access attempts against exchange admin panels, corporate SSO, or wallet operations tied to stolen browser and Keychain material. The campaign’s stated impacts include account takeovers, unauthorized infrastructure access, financial losses, and exposure of critical data.

Two operational unknowns also matter. The excerpt references a “Tuesday” flagging without a date, and it is not clear from the provided material whether the campaign is ongoing or contained. Finally, variant behavior is a tell. If operators shift exfiltration away from Telegram or alter the rm-based self-deletion routine, that would signal adaptation to detection and incident response pressure.

Why Lazarus Tradecraft Shifts Matter More Than the Malware Name

I care less about the “Mach-O Man” branding than the workflow it’s exploiting. Fake meeting lures plus ClickFix execution is a clean way to route around a lot of perimeter and endpoint assumptions, because the user becomes the installer and the command line becomes the delivery mechanism.

The threshold that matters is whether stolen browser and Keychain artifacts start showing up as real access events inside crypto operations, not just as malware telemetry. If that linkage holds, the setup starts to look structural rather than narrative-driven, because it turns everyday macOS browsing and SSO habits into a repeatable liquidity event for attackers: fast credential capture, fast exfiltration, and fewer traces left behind.

Sources