Misty 23pds Alert: Lazarus Group releases a new macOS toolkit targeting cryptocurrencies

MarketWhisper

macOS工具包

Mandiant’s Chief Information Security Officer 23pds issued an alert on April 22, stating that the North Korean hacking group Lazarus Group has released a new native macOS malware toolkit called “Mach-O Man,” which is specifically designed to target the cryptocurrency industry and executives at high-value enterprises.

Attack Methods and Targets

According to Mauro Eldritch’s analysis report, this campaign uses the ClickFix technique: the attackers send a link disguised as a legitimate meeting invitation via Telegram (using a contact account that has been compromised). The link leads the target to a fake website impersonating Zoom, Microsoft Teams, or Google Meet, and prompts users to run a command in the macOS terminal to “fix” the connection problem. This operation enables the attackers to gain system access without triggering traditional security control measures.

The attack targets include: credentials and cookies stored by browsers, data from the macOS Keychain, and extension data from browsers such as Brave, Vivaldi, Opera, Chrome, Firefox, and Safari. The stolen data is leaked through the Telegram Bot API; the report indicates that the attackers exposed a Telegram bot token (an OPSEC mistake), weakening their operational security.

The primary targets are developers, executives, and decision-makers in fintech and the cryptocurrency industry, as well as high-value enterprise environments where macOS is widely used.

Main Components of the Mach-O Man Toolkit

Based on Mauro Eldritch’s technical analysis, the toolkit consists of the following main modules:

teamsSDK.bin: Initial dropper, disguised as Teams, Zoom, Google, or system applications, performing basic system fingerprint identification

D1{random string}.bin: System analyzer, collecting the hostname, CPU type, operating system information, and browser extension lists, then sending them to the C2 server

minst2.bin: Persistence module, creating a disguised “Antivirus Service” directory and LaunchAgent to ensure continuous execution after each login

macrasv2: Final stealer, collecting browser credentials, cookies, and macOS Keychain entries, packaging them, leaking them via Telegram, and then self-deleting

Key Intrusion Indicators (IOCs) Summary

According to the IOCs published in Mauro Eldritch’s report:

Malicious IPs: 172[.]86[.]113[.]102 / 144[.]172[.]114[.]220

Malicious domains: update-teams[.]live / livemicrosft[.]com

Key files (partial): teamsSDK.bin, macrasv2, minst2.bin, localencode, D1YrHRTg.bin, D1yCPUyk.bin

C2 communication ports: 8888 and 9999; primarily uses a Go HTTP client User-Agent characteristic string

For the complete hashes and the ATT&CK matrix, see Mauro Eldritch’s original research report.

Frequently Asked Questions

“Mach-O Man” toolkit: Which industries and targets does it focus on?

According to Mandiant’s 23pds alert and BCA LTD’s research, “Mach-O Man” mainly targets the fintech and cryptocurrency industry, as well as high-value enterprise environments where macOS is widely used—especially the developer, executive, and decision-maker groups.

How do attackers trick macOS users into running malicious commands?

According to Mauro Eldritch’s analysis, the attackers send links via Telegram disguised as legitimate meeting invitations, leading users to fake websites impersonating Zoom, Teams, or Google Meet. They then prompt users to run commands in the macOS terminal to “fix” connection issues, thereby triggering the installation of the malware.

How does “Mach-O Man” achieve data exfiltration?

According to Mauro Eldritch’s technical analysis, the final module macrasv2 collects browser credentials, cookies, and macOS Keychain data, packages them, and exfiltrates them via the Telegram Bot API. Meanwhile, the attackers use a self-deleting script to clear system traces.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

RAVE Token Surges 110x in Two Weeks, Then Crashes 98% Amid Market Manipulation Allegations

Gate News message, April 27 — RAVE, the native token of RaveDAO (a Web3-based cultural community project), skyrocketed 110x in two weeks before plummeting 98% over two days on April 19-20, prompting comparisons to the infamous 2007 Lubo stock manipulation scandal in South Korea. On April 18, RAVE r

GateNews2h ago

Research reveals: Polymarket players take home 30% of profits by winning 3% of the positions—more than 70% of players absorb all losses

A new study analyzes Polymarket’s trading records from 2023–2025 and shows that only 3.14% of experienced winners control more than 30% of the profits. Crowd participation alone is not enough to explain overall accuracy; at the same time, it tracks 1,950 highly suspicious insider trading accounts that, while not driving predictions, amplified price volatility. The case shows that large bets were placed and profits were made before the U.S. announced developments regarding Venezuela. The research questions “wisdom of crowds” and emphasizes the need for increasingly strict regulation.

ChainNewsAbmedia2h ago

France: More than 40 crypto investor kidnappings in 2026, involving leaked tax data

According to Market Forces Africa, reported on April 27, incidents of kidnapping and violent attacks targeting cryptocurrency investors in France have increased sharply. On the X platform, Telegram founder Pavel Durov said that since the beginning of 2026, he has recorded 41 cases of cryptocurrency investor kidnappings, averaging one incident every 2.5 days, and that they are linked to a leak of French tax records.

MarketWhisper3h ago

Hubei cybersecurity police received a Second Class Merit Award, solving the province’s first “hundred-million-yuan” virtual-coin theft case in 70 days

According to a report by Hubei Daily on April 27, Guo Tingyu, a police officer from the Cyber Security Brigade of the Qingshan Branch of the Wuhan Municipal Public Security Bureau, was recently awarded the Individual Second-Class Merit. Guo Tingyu graduated from Huazhong University of Science and Technology with a degree in computer science. In 2023, he passed the civil service exam to join the police force. In early 2024, he took charge of the first virtual currency theft case in all of Hubei Province. After nearly 70 days of investigation and case-solving, the amount of involved funds exceeded 100 million yuan, and all five suspects were fully dealt with in accordance with the law.

MarketWhisper3h ago

Litecoin Executes Deep Chain Reorganization to Undo MWEB Privacy Layer Exploit

Gate News message, April 27 — Litecoin underwent a deep chain reorganization on Saturday (April 26) after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, the Litecoin Foundation announced. The reorg spanned blocks 3,095,930 to 3,095,943 and

GateNews4h ago

China Breaks Cryptocurrency Theft Ring Worth Over $140 Million, Arrests 5 Suspects

Gate News message, April 27 — A cybercrime unit in Wuhan, China's Hubei Province, has dismantled a cryptocurrency theft ring involving counterfeit wallet applications, with investigations revealing over 100 million yuan (approximately $14 million) in illicit proceeds. Five suspects have been

GateNews4h ago
Comment
0/400
No comments