
SUI And USDC Now Power Real-World Transactions On RedotPay
SUI and USDC are now live on RedotPay, enabling real-world transactions through crypto cards!

A new macOS malware linked to the Lazarus Group targets crypto and fintech firms. The malware, named 'Mach-O Man', is distributed through social engineering tactics, leading to potential financial losses and data exposure.
Mentioned in this story
Security researchers have linked a new macOS malware campaign to the Lazarus Group, the North Korea-linked hacking operation behind some of the crypto industry’s biggest thefts.
Flagged on Tuesday, the new “Mach-O Man” malware kit is distributed via “ClickFix” social engineering schemes across traditional businesses and crypto companies, according to Mauro Eldritch, offensive security expert and founder of threat intelligence company BCA Ltd.
Victims are lured into a fake Zoom or Google Meet call where they are prompted to execute commands that download the malware in the background, allowing attackers to bypass traditional controls without detection to gain access to credentials and corporate systems, the security researcher said in a Tuesday report.
Researchers said the campaign can lead to account takeovers, unauthorized infrastructure access, financial losses and the exposure of critical data, underscoring how Lazarus continues to expand its targeting beyond crypto-native companies.
The Lazarus Group is the main suspect in some of the largest-ever cryptocurrency hacks, including the $1.4 billion hack of Bybit exchange in 2025, the industry’s largest so far.

Fake Mach-O Man Kit apps. Source: ANY.RUN
The final stage of the campaign is a stealer designed to extract browser extension data, stored browser credentials, cookies, macOS Keychain entries and other sensitive information from infected devices.

Final staging director for Stealer malware. Source: Any.run
After collection, the data is archived into a zip file and exfiltrated through Telegram to the attackers. Finally, the malware’s self-deletion script removes the entire kit using the system’s rm command, which bypasses user confirmation and permissions when removing files.
The Mach-O Man malware is linked to the Lazarus Group, a North Korea-associated hacking operation.
Victims are lured into fake Zoom or Google Meet calls where they unknowingly execute commands that download the malware.
Consequences include account takeovers, unauthorized access to infrastructure, financial losses, and exposure of critical data.

SUI and USDC are now live on RedotPay, enabling real-world transactions through crypto cards!

GSR introduces the GSR Crypto Core3 ETF on Nasdaq, offering exposure to Bitcoin, Ethereum, and Solana.

Bitcoin Hits $79,000 After STRC Ex-Dividend Date, Ending Six-Month Slump

Bitcoin tops $79,000 as major altcoins and crypto stocks rise.

Bitcoin hits $79,214, marking a major short squeeze with a 4,362% liquidation imbalance.

Beware of 'MacSync' - a new macOS malware stealing crypto wallets!
See every story in Crypto — including breaking news and analysis.
The novel malware kit was reconstructed by the security expert through cloud-based malware sandbox Any.run’s macOS analysis capabilities.
Earlier in April, North Korean hackers used AI-enabled social engineering schemes to steal about $100,000 worth of funds from crypto wallet Zerion, after gaining access to some team members’ logged-in sessions, credentials and the company’s private keys, Cointelegraph reported on April 15.