Lazarus malware targets macOS crypto firms via zoom

Grafa
Lazarus malware targets macOS crypto firms via zoom
Lazarus malware targets macOS crypto firms via zoom
Isaac Francis
Written by Isaac Francis
Share

A new macOS malware campaign linked to the Lazarus Group is targeting crypto and fintech firms through social engineering attacks disguised as video calls.

Security researchers said the “Mach-O Man” malware is distributed via fake Zoom or Google Meet sessions that trick victims into executing malicious commands.

“Victims are lured into a fake Zoom or Google Meet call where they are prompted to execute commands that download the malware in the background,”

Said Mauro Eldritch.

The attack allows hackers to bypass traditional security controls, gaining access to credentials, corporate systems and sensitive infrastructure without detection.

The malware ultimately deploys a data-stealing payload that extracts browser credentials, cookies, macOS Keychain data and other sensitive information before exfiltrating it via Telegram.

The Lazarus Group has been linked to some of the largest crypto thefts, including the $1.4 billion hack of the Bybit in 2025, highlighting its continued focus on high-value targets.

Researchers warn the campaign reflects a broader expansion of Lazarus tactics beyond crypto-native firms, increasing risks for traditional financial and technology companies.

Frequently asked questions

Connect with us

Grafa is not a financial advisor. You should seek independent, legal, financial, taxation or other advice that relate to your unique circumstances.

Grafa is not liable for any loss caused, whether due to negligence or otherwise arising from the use of or reliance on the information provided directly or indirectly, by use of this platform.