
A new macOS malware campaign linked to the Lazarus Group is targeting crypto and fintech firms through social engineering attacks disguised as video calls.
Security researchers said the “Mach-O Man” malware is distributed via fake Zoom or Google Meet sessions that trick victims into executing malicious commands.
“Victims are lured into a fake Zoom or Google Meet call where they are prompted to execute commands that download the malware in the background,”
Said Mauro Eldritch.
The attack allows hackers to bypass traditional security controls, gaining access to credentials, corporate systems and sensitive infrastructure without detection.
The malware ultimately deploys a data-stealing payload that extracts browser credentials, cookies, macOS Keychain data and other sensitive information before exfiltrating it via Telegram.
The Lazarus Group has been linked to some of the largest crypto thefts, including the $1.4 billion hack of the Bybit in 2025, highlighting its continued focus on high-value targets.
Researchers warn the campaign reflects a broader expansion of Lazarus tactics beyond crypto-native firms, increasing risks for traditional financial and technology companies.