Lazarus Group Malware Targets Crypto, Business Execs via macOS | News World

Browse the world's leading international and domestic Airlines. Compare rates and availabilty for any destination and route.

Security researchers have linked a new macOS malware campaign to the Lazarus Group, the North Korea-linked hacking operation behind some of the crypto industry’s biggest thefts.

Flagged on Tuesday, the new “Mach-O Man” malware kit is distributed via “ClickFix” social engineering schemes across traditional businesses and crypto companies, according to Mauro Eldritch, offensive security expert and founder of threat intelligence company BCA Ltd.

Victims are lured into a fake Zoom or Google Meet call where they are prompted to execute commands that download the malware in the background, allowing attackers to bypass traditional controls without detection to gain access to credentials and corporate systems, the security researcher said in a Tuesday report.

Researchers said the…

more
Source cointelegraph.com

FTC: We use income earning affiliate links. More on Sposored links.
Terms of use and third-party services. More here.

lyrics2.me  | Billboard |  Rolling Stone |  K-Pop

Related Posts

More PayPal emails hijacked to deliver tech support scams | Malware

Scammers have found another way to get deceptive messages delivered through PayPal’s legitimate services. In December 2025, we reported that PayPal closed a loophole that let scammers send real emails…

Read more

PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials | Cybersecurity

Ravie LakshmananApr 30, 2026Supply Chain Attack / Malware In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious…

Read more

Hackers stole hundreds of thousands of Roblox accounts: Here’s what to do | Malware

More than 610,000 Roblox accounts were reportedly stolen. Was yours or your child’s among them? Ukrainian police arrested three individuals in Lviv who allegedly orchestrated one of the largest Roblox…

Read more

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories | Cybersecurity

Ravie LakshmananApr 30, 2026Hacking News / Cybersecurity News The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam…

Read more

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades | Cybersecurity

Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers,…

Read more

Scam-checking just got a lot easier: Malwarebytes is now in Claude  | Malware

For years, Malwarebytes has protected people by going where they are, and where people are today is increasingly within AI tools. As these chatbots tackle more everyday questions—like what to wear for an interview, how…

Read more

Researchers built a chatbot that only knows the world before 1931 | Malware

The internet’s chatbots have read every forum rant, leaked Slack log, and confident blog post your uncle ever wrote about chemtrails. The results are predictable: they reflect the state of…

Read more

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack | Cybersecurity

Ravie LakshmananApr 29, 2026Supply Chain Attack / Malware Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to…

Read more

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs | Cybersecurity

Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic’s Claude Opus large language model (LLM). The package…

Read more

Microsoft won’t patch PhantomRPC: Feature or bug? | Malware

A researcher has discovered a weakness called PhantomRPC that Microsoft does not consider a vulnerability it plans to patch. PhantomRPC involves Windows Remote Procedure Call (RPC), the core of communication…

Read more

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV | Cybersecurity

Ravie LakshmananApr 29, 2026Vulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known…

Read more

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure | Cybersecurity

Ravie LakshmananApr 29, 2026Vulnerability / Cloud Security In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI’s LiteLLM Python…

Read more

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push | Cybersecurity

Ravie LakshmananApr 28, 2026Vulnerability / Software Security Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to…

Read more

Fake CAPTCHA scam turns a quick click into a costly phone bill | Malware

Researchers have documented a long‑running campaign that uses fake CAPTCHA pages to trick mobile users into sending dozens of international SMS messages in the background. If you’ve spent any time…

Read more

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi | Cybersecurity

Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across…

Read more

Chinese engineer stole US military and NASA software for years | Malware

International espionage isn’t always about sophisticated malware and zero-day bugs. Sometimes it’s as simple as pretending to be someone else asking for a favor. For four years, a Chinese aerospace…

Read more

Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks | Cybersecurity

Ravie LakshmananApr 28, 2026Cyber Espionage / Vulnerability A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.  Xu…

Read more

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack | Cybersecurity

Ravie LakshmananApr 27, 2026 Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company…

Read more

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side | Cybersecurity

Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurity-focused AI system capable of identifying vulnerabilities at scale and raising serious…

Read more

A week in security (April 20 – April 26) | Malware

Last week on Malwarebytes Labs: Medical data of 500,000 UK volunteers listed for sale on Alibaba How cyberattacks on companies affect everyone Apple fixes iOS bug that kept deleted notifications,…

Read more

Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud | Cybersecurity

Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their…

Read more

Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software | Cybersecurity

Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment centrifuges. According to a…

Read more

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline | Cybersecurity

Ravie LakshmananApr 25, 2026Network Security / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X…

Read more

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches | Cybersecurity

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025…

Read more

Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine | Cybersecurity

The AI Agent Authority Gap – From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is…

Read more

Medical data of 500,000 UK volunteers listed for sale on Alibaba | Malware

Half a million Britons signed up to help cure cancer. Their data ended up for sale on Alibaba. The UK Biobank charity informed the British government of an incident concerning…

Read more

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2 | Cybersecurity

Ravie LakshmananApr 24, 2026Malware / Threat Intelligence Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation…

Read more

Roblox clamps down on chats and age checks as legal pressure builds | Malware

Roblox has long faced criticism over child safety on its platform. Now it has started settling with state attorneys over the issue, and the total is climbing fast. On April…

Read more

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware | Cybersecurity

A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. “As with…

Read more

How cyberattacks on companies affect everyone | Malware

If you use the internet, you’ve likely been affected by cybercrime in some way. Even when an attack is aimed at a company, the fallout usually lands on ordinary people….

Read more
Update cookies preferences