Lazarus Group's 'Mach-O Man' Malware Targets Crypto Executives via LinkedIn, Evades Detection with Self-Deletion
April 22, 2026
A macOS-focused malware kit named Mach-O Man, attributed to Lazarus Group and developed by the Famous Chollima group, targets crypto and fintech firms using social engineering on LinkedIn and Telegram to infiltrate executives and high-value accounts.
The campaign centers on credential theft and data loss, with attackers manipulating business communications to deploy the malware and gain persistent access.
Mach-O Man specifically targets cryptocurrency executives and senior business officials, leveraging social engineering to lure victims into executing weaponized software after contact via professional networks.
The operation employs convincing fake verification steps and visuals that bypass security controls by appearing routine, leading to a breach without triggering alarms.
Readers are reminded to verify information independently and consult editorial standards when assessing crypto-security reporting.
A self-deletion script uses system commands to erase the entire kit, aiding in evading detection and prolonging stealth.
Experts warn the attack is hard to detect with traditional defenses because the malware is executed by the victim and can erase itself after use.
Telemetry indicates a sustained campaign with active command-and-control for months, correlated with rising unauthorized corporate fund transfers in the Asia-Pacific region.
Executive-device compromises risk lateral movement into broader networks, potentially compromising VPNs and internal systems, with implications for IP and operations.
Once executed, Mach-O Man establishes a persistent backdoor for remote access, data exfiltration, and potential financial theft.
Variants include hijacking DeFi project domains and replacing sites with fake Cloudflare messages prompting users to enter commands to grant access.
April findings show a broader North Korean IT footprint in Web3 firms and prior DPRK crypto insider networks, signaling a wider state-sponsored campaign pattern.
Summary based on 5 sources
Get a daily email with more Crypto stories
Sources

Cointelegraph • Apr 22, 2026
Lazarus Group Malware Targets Crypto, Business Execs via macOS
CoinDesk • Apr 22, 2026
North Korean-backed hackers roll out new attack vector targeting crypto executives and firms
CryptoNews • Apr 22, 2026
Lazarus Group has become especially dangerous with new Mach-O Man attack: CertiK
forklog.media • Apr 22, 2026
Cybersecurity Experts Warn of New Wave of North Korean Hacker Attacks | ForkLog