Misty 23pds Alert: Lazarus Group releases a new macOS toolkit targeting cryptocurrencies

MarketWhisper

macOS工具包

Mandiant’s Chief Information Security Officer 23pds issued an alert on April 22, stating that the North Korean hacking group Lazarus Group has released a new native macOS malware toolkit called “Mach-O Man,” which is specifically designed to target the cryptocurrency industry and executives at high-value enterprises.

Attack Methods and Targets

According to Mauro Eldritch’s analysis report, this campaign uses the ClickFix technique: the attackers send a link disguised as a legitimate meeting invitation via Telegram (using a contact account that has been compromised). The link leads the target to a fake website impersonating Zoom, Microsoft Teams, or Google Meet, and prompts users to run a command in the macOS terminal to “fix” the connection problem. This operation enables the attackers to gain system access without triggering traditional security control measures.

The attack targets include: credentials and cookies stored by browsers, data from the macOS Keychain, and extension data from browsers such as Brave, Vivaldi, Opera, Chrome, Firefox, and Safari. The stolen data is leaked through the Telegram Bot API; the report indicates that the attackers exposed a Telegram bot token (an OPSEC mistake), weakening their operational security.

The primary targets are developers, executives, and decision-makers in fintech and the cryptocurrency industry, as well as high-value enterprise environments where macOS is widely used.

Main Components of the Mach-O Man Toolkit

Based on Mauro Eldritch’s technical analysis, the toolkit consists of the following main modules:

teamsSDK.bin: Initial dropper, disguised as Teams, Zoom, Google, or system applications, performing basic system fingerprint identification

D1{random string}.bin: System analyzer, collecting the hostname, CPU type, operating system information, and browser extension lists, then sending them to the C2 server

minst2.bin: Persistence module, creating a disguised “Antivirus Service” directory and LaunchAgent to ensure continuous execution after each login

macrasv2: Final stealer, collecting browser credentials, cookies, and macOS Keychain entries, packaging them, leaking them via Telegram, and then self-deleting

Key Intrusion Indicators (IOCs) Summary

According to the IOCs published in Mauro Eldritch’s report:

Malicious IPs: 172[.]86[.]113[.]102 / 144[.]172[.]114[.]220

Malicious domains: update-teams[.]live / livemicrosft[.]com

Key files (partial): teamsSDK.bin, macrasv2, minst2.bin, localencode, D1YrHRTg.bin, D1yCPUyk.bin

C2 communication ports: 8888 and 9999; primarily uses a Go HTTP client User-Agent characteristic string

For the complete hashes and the ATT&CK matrix, see Mauro Eldritch’s original research report.

Frequently Asked Questions

“Mach-O Man” toolkit: Which industries and targets does it focus on?

According to Mandiant’s 23pds alert and BCA LTD’s research, “Mach-O Man” mainly targets the fintech and cryptocurrency industry, as well as high-value enterprise environments where macOS is widely used—especially the developer, executive, and decision-maker groups.

How do attackers trick macOS users into running malicious commands?

According to Mauro Eldritch’s analysis, the attackers send links via Telegram disguised as legitimate meeting invitations, leading users to fake websites impersonating Zoom, Teams, or Google Meet. They then prompt users to run commands in the macOS terminal to “fix” connection issues, thereby triggering the installation of the malware.

How does “Mach-O Man” achieve data exfiltration?

According to Mauro Eldritch’s technical analysis, the final module macrasv2 collects browser credentials, cookies, and macOS Keychain data, packages them, and exfiltrates them via the Telegram Bot API. Meanwhile, the attackers use a self-deleting script to clear system traces.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Crypto Hacks Fuel Wall Street Tokenization Debate

High-profile crypto exploits test DeFi risk yet unlikely derail tokenization; institutions favor permissioned chains, while broader tokenization must interoperate with DeFi; stablecoins face scrutiny and possible regulatory backlash.

CryptoFrontier3h ago

Volo Protocol Loses $3.5M in Sui Hack, Commits to Absorb Losses and Freeze Hacker Funds

Gate News message, April 22 — Volo Protocol, a yield vault operator on Sui, announced yesterday (April 21) that it has begun freezing stolen assets following a $3.5 million exploit. Hackers looted WBTC, XAUm, and USDG from Volo Vaults, marking the latest major DeFi security breach in a

GateNews6h ago

French Family Forced to Transfer $820K in Crypto After Armed Home Invasion

Gate News message, April 22 — A family in Ploudalmézeau, a small town in Brittany, France, was invaded by two armed masked men on Monday (April 20), according to reporting by The Block. Three adults were bound for over three hours and forced to transfer approximately 700,000 euros (about $820,000) i

GateNews7h ago

DOJ Launches Compensation Process for OneCoin Fraud Victims, $40M+ in Recovered Assets Available

Gate News message, April 22 — The U.S. Department of Justice has announced the launch of a compensation process for victims of the OneCoin cryptocurrency fraud scheme, with more than $40 million in recovered assets now available for distribution. The scheme, operated between 2014 and 2019 by Ruja

GateNews8h ago

AI16Z, ELIZAOS Creators Sued Over $2.6B Fraud Allegations; Token Crashes 99.9% From Peak

Federal class action accuses AI16Z/ELIZAOS of a $2.6B crypto fraud via fake AI claims and deceptive marketing, alleging insider favoritism and a staged autonomous system; seeks damages under consumer protection laws. Abstract: This report covers a SDNY federal class-action filed April 21 accusing AI16Z and its rebrand ELIZAOS of a $2.6 billion crypto fraud involving fake AI claims and deceptive marketing. The suit alleges a manufactured link with Andreessen Horowitz and a non-autonomous system. It details a peak valuation in early 2025, a 99.9% crash, and about 4,000 losing wallets, with insiders receiving ~40% of new tokens. Plaintiffs seek damages and equitable relief under New York and California consumer-protection laws. Regulators in Korea and major exchanges have warned or suspended related trading.

GateNews10h ago

SlowMist Alerts: Active MacSync Stealer macOS Malware Targeting Crypto Users

SlowMist warns of MacSync Stealer (v1.1.2) for macOS that steals wallets, credentials, keychains, and infra keys, using spoofed AppleScript prompts and fake 'unsupported' errors; urges caution and awareness of IOCs. Abstract: This report summarizes SlowMist's alert about MacSync Stealer (v1.1.2), a macOS information stealer targeting cryptocurrency wallets, browser credentials, system keychains, and infrastructure keys (SSH, AWS, Kubernetes). It deceives users with spoofed AppleScript dialogs prompting for passwords and visible fake 'unsupported' messages. SlowMist provides IOCs to customers and advises avoiding unverified macOS scripts and remaining vigilant for unusual password prompts.

GateNews11h ago
Comment
0/400
No comments