Wednesday, April 22, 2026
Catatonic Times
No Result
View All Result
  • Home
  • Crypto Updates
  • Bitcoin
  • Ethereum
  • Altcoin
  • Blockchain
  • NFT
  • Regulations
  • Analysis
  • Web3
  • More
    • Metaverse
    • Crypto Exchanges
    • DeFi
    • Scam Alert
  • Home
  • Crypto Updates
  • Bitcoin
  • Ethereum
  • Altcoin
  • Blockchain
  • NFT
  • Regulations
  • Analysis
  • Web3
  • More
    • Metaverse
    • Crypto Exchanges
    • DeFi
    • Scam Alert
No Result
View All Result
Catatonic Times
No Result
View All Result

Mach-O Man Malware Steals macOS Keychain Data in Lazarus Group Crypto Campaign – Bitcoin News

by Catatonic Times
April 22, 2026
in Crypto Updates
Reading Time: 7 mins read
0 0
A A
0
Home Crypto Updates
Share on FacebookShare on Twitter


Key Takeaways:

North Korea’s Lazarus Group deployed Mach-O Man malware concentrating on macOS customers in crypto and fintech roles in April 2026. Bitso’s Quetzal Crew confirmed the Go-compiled package permits credential theft, Keychain entry, and information exfiltration through 4 levels. Safety researchers urged corporations on April 22, 2026, to dam Terminal-based ClickFix lures and audit LaunchAgents for Onedrive masquerading information.

Researchers Expose North Korean macOS Malware Focusing on U.S. Crypto and Web3 Corporations

Safety researchers at Bitso’s Quetzal Crew, working alongside the ANY.RUN sandbox platform, publicly disclosed the package on April 21, 2026, after analyzing a marketing campaign they named “North Korea’s Safari.” The crew related the package to Lazarus’s current large-scale crypto thefts, together with assaults on KelpDAO and Drift, citing the group’s constant concentrating on of high-value macOS customers in Web3 and fintech roles.

Mach-O Man is written in Go and compiled as Mach-O binaries, making it native to each Intel and Apple Silicon machines. The package runs in 4 distinct levels and is designed to reap browser credentials, macOS Keychain entries, and crypto account entry earlier than deleting traces of itself.

The an infection begins with social engineering, not a software program exploit. Attackers compromise or impersonate Telegram accounts belonging to colleagues in Web3 and crypto circles. The goal receives an pressing assembly invite for Zoom, Microsoft Groups, or Google Meet that hyperlinks to a convincing pretend web site, similar to update-teams.dwell or livemicrosft.com.

The pretend web site shows a simulated connection error and instructs the person to repeat and paste a Terminal command to resolve it. This method, referred to as Clickfix and tailored right here for macOS, leads the person to execute the preliminary stager file, teamsSDK.bin, through curl. As a result of the person runs the command manually, macOS Gatekeeper doesn’t block it.

The stager downloads a pretend app bundle, applies ad-hoc code signing to make it seem official, and prompts the person for his or her macOS password. The window shakes on the primary two makes an attempt and accepts the credential on the third, a deliberate design option to construct false belief.

From there, the researcher’s report, and different accounts say a profiler binary enumerates the machine’s hostname, UUID, CPU, working system particulars, operating processes, and browser extensions throughout Courageous, Chrome, Firefox, Safari, Opera, and Vivaldi. Researchers famous the profiler comprises a coding bug that creates an infinite loop, inflicting noticeable CPU spikes that may expose an energetic an infection.

A persistence module then drops a renamed file referred to as Onedrive right into a hidden path below a folder labeled “Antivirus Service” and registers a Launchagent referred to as com.onedrive.launcher.plist so it runs robotically at login.

The ultimate stage, a stealer binary labeled macrasv2, collects browser extension information, SQLite credential databases, and Keychain objects, compresses them into a zipper file, and exfiltrates the package deal by means of the Telegram Bot API. Researchers discovered the Telegram bot token uncovered within the binary, which they described as a significant operational safety failure that might permit defenders to watch or disrupt the channel.

The Quetzal Crew printed SHA-256 hashes for all main parts, together with community indicators pointing to IP addresses 172.86.113.102 and 144.172.114.220. Safety researchers famous the package has been noticed in use by teams past Lazarus, suggesting the tooling has been shared or offered throughout the risk actor ecosystem.

Lazarus, additionally tracked as Well-known Chollima by risk intelligence corporations, has been attributed to billions of {dollars} in cryptocurrency theft over the previous a number of years. The group’s prior macOS instruments included Applejeus and Rustbucket. Mach-O Man follows the identical goal profile whereas decreasing the technical barrier for macOS compromises.

Volo Protocol Loses $3.5 Million in Sui Blockchain Exploit, Blocks WBTC Bridge Try

Volo Protocol, a liquid staking and BTCFi platform on the Sui blockchain, confirmed a $3.5 million safety exploit this week,…

Learn Now

Volo Protocol Loses $3.5 Million in Sui Blockchain Exploit, Blocks WBTC Bridge Attempt

Bitcoin.com News

Volo Protocol Loses $3.5 Million in Sui Blockchain Exploit, Blocks WBTC Bridge Try

Volo Protocol, a liquid staking and BTCFi platform on the Sui blockchain, confirmed a $3.5 million safety exploit this week,…

Learn Now

Volo Protocol Loses $3.5 Million in Sui Blockchain Exploit, Blocks WBTC Bridge Attempt

Bitcoin.com News

Volo Protocol Loses $3.5 Million in Sui Blockchain Exploit, Blocks WBTC Bridge Try

Learn Now

Volo Protocol, a liquid staking and BTCFi platform on the Sui blockchain, confirmed a $3.5 million safety exploit this week,…

Safety groups at crypto and fintech corporations are suggested to audit Launchagents directories, monitor for Onedrive processes operating from uncommon file paths, and block outbound Telegram Bot API site visitors the place it’s not operationally required. Customers ought to by no means paste Terminal instructions copied from internet pages or unsolicited assembly hyperlinks.

Organizations operating macOS fleets in Apple-heavy crypto environments ought to deal with any pressing, unsolicited assembly hyperlink as a possible entry level till verified by means of a separate communication channel.



Source link

Tags: BitcoinCampaigncryptoDataGroupKeychainLazarusMachOmacOSMalwaremanNewsSteals
Previous Post

Bitcoin, Ethereum Need A Post-Quantum Plan Now, Coinbase Says

Next Post

Coinbase Says Algorand and Aptos Are Prepared for Quantum Threat

Related Posts

X Rolls Out 75+ Custom Timelines Powered by Grok, Premium Users Get First Access
Crypto Updates

X Rolls Out 75+ Custom Timelines Powered by Grok, Premium Users Get First Access

April 22, 2026
M In Ether Locked After Kelp Security Breach
Crypto Updates

$71M In Ether Locked After Kelp Security Breach

April 22, 2026
Late Gambino Boss John Gotti’s Grandson Sentenced to 15 Months for .1M COVID Loan Fraud Tied to Crypto Firm – Bitcoin News
Crypto Updates

Late Gambino Boss John Gotti’s Grandson Sentenced to 15 Months for $1.1M COVID Loan Fraud Tied to Crypto Firm – Bitcoin News

April 21, 2026
Arkham Launches Decentralized Trading With 800K Wallet Data on Solana
Crypto Updates

Arkham Launches Decentralized Trading With 800K Wallet Data on Solana

April 21, 2026
Coinbase Launches UK Crypto Lending Using DeFi Protocol Morpho as Its Backend
Crypto Updates

Coinbase Launches UK Crypto Lending Using DeFi Protocol Morpho as Its Backend

April 22, 2026
MIT Researcher Proposes Path To Make Bitcoin Quantum-Safe
Crypto Updates

MIT Researcher Proposes Path To Make Bitcoin Quantum-Safe

April 21, 2026
Next Post
Coinbase Says Algorand and Aptos Are Prepared for Quantum Threat

Coinbase Says Algorand and Aptos Are Prepared for Quantum Threat

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Catatonic Times

Stay ahead in the cryptocurrency world with Catatonic Times. Get real-time updates, expert analyses, and in-depth blockchain news tailored for investors, enthusiasts, and innovators.

Categories

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Web3

Latest Updates

  • Coinbase Says Algorand and Aptos Are Prepared for Quantum Threat
  • Mach-O Man Malware Steals macOS Keychain Data in Lazarus Group Crypto Campaign – Bitcoin News
  • Bitcoin, Ethereum Need A Post-Quantum Plan Now, Coinbase Says
  • About Us
  • Advertise with Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact Us

Copyright © 2024 Catatonic Times.
Catatonic Times is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Crypto Updates
  • Bitcoin
  • Ethereum
  • Altcoin
  • Blockchain
  • NFT
  • Regulations
  • Analysis
  • Web3
  • More
    • Metaverse
    • Crypto Exchanges
    • DeFi
    • Scam Alert

Copyright © 2024 Catatonic Times.
Catatonic Times is not responsible for the content of external sites.