• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About TronWeekly
  • Write for us
  • Terms and Conditions
  • Privacy Policy
  • Disclaimer
  • Contact
  • All Posts
  • Advertise

TronWeekly

Crypto World News

  • Home
  • Latest News
  • Opinion
    • Education
    • Best TRON Wallets
    • Beginner’s guide to TRON
    • Tron Tokens
    • Market Analysis
  • Industry
    • Tron Exchange
    • Project Review
  • Press Release
  • Bitcoin (BTC)
  • Ripple (XRP)
  • Advertise
  • About TronWeekly
    • The Team
    • Editorial Policy
    • Write for us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • Contact
You are here: Home / Cryptocurrency News / Lazarus Group Launches Dangerous macOS Malware Campaign Targeting Businesses

Lazarus Group Launches Dangerous macOS Malware Campaign Targeting Businesses

What to know:

  • Attackers use fake meeting links and simple instructions to trick users into installing malware themselves
  • Stolen data, including passwords and system access, is secretly sent through trusted platforms like Telegram

By Onyi | Edited By Ammar Raza,April 23, 2026, 2:00 AM

Lazarus Group Launches Dangerous macOS Malware Campaign Targeting Businesses

Lazarus Group has launched a new cyberattack campaign that tricks employees into infecting their devices.

Lazarus Group is currently using fake meeting invitations to gain access to company systems. Their goal is to steal credentials, sensitive data, and financial information from businesses.

The attack starts with a message sent through Telegram, usually from a compromised or trusted contact. Victims are then invited to join a meeting that appears to be hosted on either Zoom, Microsoft Teams, or Google Meet.

How Lazarus  Group newly launched Malware hack first starts.

Source: any.run

Source: any.run

When the user clicks the link, they are taken to a website that looks real. The fake site shows an error message and tells the user to copy and paste a command into their terminal to fix the issue. This step gives Lazarus Group control, because the user runs the malicious command themselves.

This campaign introduces a new macOS malware kit called Mach-O Man. It is designed to avoid detection by using normal system tools and relying on human behavior instead of technical vulnerabilities.

The fake malware kit with all its components.

Source: any.run
The fans teams that collect details about users.

Source: any.run

Source: any.run

How Lazarus Group Launched the Attack

After the command is executed, the malware installs itself in several stages. First, it runs a file that downloads fake applications that look like trusted software. These fake apps repeatedly ask the user for their password, even if the password is correct, and then pretend the process has succeeded.

In the background, the malware collects system details such as device information, running processes, and browser data. Lazarus Group created it in such a way that it targets popular browsers to extract saved credentials, cookies, and extensions.

Also Read: Crypto Bridge Laundering Surges After $290M Lazarus Hack

The attack then creates persistence on the device by installing hidden startup processes. This ensures the malware continues running even after the system is restarted.

Finally, a data-stealing component gathers sensitive information, including macOS Keychain data and stored login details. All this data is packaged into a file and sent back to the attackers using Telegram, which helps the activity blend into normal traffic.

Why This Attack Is Dangerous

This campaign is hard to detect because it relies on social engineering rather than software flaws. Since users execute the commands themselves, many security systems do not flag the activity as suspicious. Also a single compromised device can give attackers access to an entire organization’s infrastructure.

Also Read: MINA Eyes $0.55 Rally as Token Shows Stability Amid Market Volatility



Filed Under: Cryptocurrency News

About Onyi

Onyinye is a News Desk writer at Tronweekly with one year of experience covering blockchain technology, decentralized finance (DeFi), and emerging Web3 developments. She focuses on delivering clear, timely, and accurate crypto news, monitoring breaking stories, ecosystem updates, and crypto-related crimes and enforcement developments. Based in Nigeria, Onyinye has contributed to multiple digital media platforms and holds a degree in Mass Communication, following strict newsroom and fact-checking standards to ensure reliable reporting for a global audience.

Primary Sidebar

Recent Posts

  • Ripple and OKX Partner to Expand RLUSD Trading Across 280+ Pairs April 29, 2026
  • Bitcoin Spot Volumes Drop as Binance Sees $25B Monthly Decline April 29, 2026
  • Ethereum Attempts $2,335 Reclaim as Realized Price Breakout Signals Bullish Shift April 29, 2026
  • Hong Kong Issues Stablecoin Fraud Alert Over Fake HSBC, HKDAP Tokens April 29, 2026
  • Trump-Backed World Liberty Financial Faces Scrutiny in 2026 April 29, 2026

Footer

News

  • Latest News
  • Altcoin News
  • Bitcoin (BTC)
  • Blockchain
  • Tron (TRX)
  • World

Digest

  • Meet the Founder
  • Price Winning Article
  • DeFi
  • Cyber Security
  • Crypto Scam

Industry

  • Project Review
  • Technology
  • Fintech
  • Tron Exchange
  • New in Town

Tron Universe

  • Event and Tron Parties
  • New in Town
  • Tron Tokens

FOLLOW US

  • Facebook
  • Telegram
  • Twitter
  • Linkedin

Subscribe US

Editorial Policy | Privacy Policy | Disclaimer | Terms and Conditions | Masthead

Copyright © 2026 · Tron Weekly. All Rights Reserved. NOTE: Tron Weekly is an independent crypto news site that adheres to the strict journalism policy anchored on transparency, trust, and objectivity, we have no affiliation with the TRON Foundation, its founder Justin Sun or any other cryptocurrency firm.