<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

North Korea's Lazarus Group Is Now Targeting Mac Users With a Sneaky New Trick

Lazarus Group targets macOS users in FinTech via fake calls, installing malware to steal credentials. Learn how to protect yourself.
Content Team

North Korea's Lazarus Group is running a ClickFix campaign against macOS users in FinTech, crypto, and leadership roles. Attackers reach targets via Telegram — often through a compromised contact's account — with fake Zoom or Google Meet invites. Once on the call, victims are told to run a command to fix connection issues, unknowingly installing malware called macrasv2, which steals credentials, browser sessions, and macOS Keychain data before self-deleting. Security firm Any.Run flagged the campaign on April 21. The fix? Train employees to never run commands to solve connectivity problems — especially on Macs.

Source: Dark Reading

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo