Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»North Korea’s Lazarus Targets macOS Users via ClickFix
    Cybersecurity

    North Korea’s Lazarus Targets macOS Users via ClickFix

    adminBy adminApril 25, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    North Korea's Lazarus Targets macOS Users via ClickFix
    Share
    Facebook Twitter LinkedIn Pinterest Email

    North Korea’s Lazarus Group is using ClickFix attacks to launch cyberattacks using novel macOS malware.

    That’s according to security vendor Any.Run, which on April 21 published research concerning a new nation-state threat campaign. Authored by offensive security expert and Birmingham Cyber Arms founder Mauro Eldritch, the report covers a wave of ClickFix attacks targeting organizations, used to distribute a range of malware. This latest research focuses primarily on a newly identified macOS malware kit that is currently being leveraged in the wild.

    ClickFix is a social engineering technique that rose to prominence over the past year or so. A threat actor tricks the victim into visiting attacker-operated infrastructure, such as a website masquerading as a fake Zoom meeting.

    When the victim reaches the Web page, they are told there are technical issues that may only be resolved if they update their software. The attacker usually instructs the victim into running malicious code, either by copying and pasting a run command (on Windows) or downloading and opening a file with the code on it (typically in macOS). 

    Related:Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

    ClickFix has been a favorite tactic of North Korean threat actors lately. Entities like Lazarus Group use it for initial access, with the ultimate goal of stealing cryptocurrency or intellectual property, or to conduct espionage. In this latest campaign, Lazarus Group is targeting FinTech, cryptocurrency, and high-value leaders in organizations with a substantial reliance on macOS devices.

    The Complete macOS Malware Attack Chain

    According to Eldritch, an attacker contacts a business leader through Telegram, often by using a compromised account belonging to a colleague or contact known to the target. The attacker sends the target a fake Zoom, Microsoft Teams, or Google Meet invitation to set up a conversation under the pretense of a business opportunity. North Korean actors have also used a potential job offer as a lure.

    The target joins the call and is prompted to enter a command to fix connection issues. Because the command is entered by the user, many traditional security controls remain untriggered. And because users are conditioned to agree to taking actions like updating software, techniques like ClickFix might not raise as many red flags to the user as a traditional phishing email. Especially when the attacker uses a business meeting as a means of lowering the target’s guard ahead of time.

    Then, “the operation is focused on extracting business value as quickly as possible,” the blog post read. “The attacker collects credentials, browser sessions, and system-stored secrets, including macOS Keychain data.” Such assets can then provide access to corporate systems, software-as-a-service (SaaS) platforms, and financial resources, Any.Run added.

    Related:Africa Relinquishes Cyberattack Lead to Latin America — For Now

    Once the user enters the command and connects to attacker infrastructure, malware is downloaded as a macOS application .bin file under an unassuming name, like “teamsSDK.bin.” This application installs the second stage binary and includes additional ways of gaining the user’s trust, such as a message saying software is updated. 

    The next binary is a system profiler that connects to attacker-hosted command-and-control (C2) infrastructure. This is then followed by a persistence mechanism that re-invokes the malware kit at every login before the primary component, a stealer named “macrasv2,” is loaded. 

    The stealer stages previously collected data like browser extension data, stored browser credentials and cookies, macOS keychain entries, and more, and consolidates them into a temporary directory for exfiltration through Telegram. Macrasv2 then runs a self-deletion script and the infection chain is complete. 

    While many North Korean state-sponsored attacks are sophisticated in nature, Eldritch noted that macrasv2 is “badly written.” Several components remain either unimplemented or incorrectly implemented, while some components enter “infinite loops that may expose its presence due to system resource starvation.” The malware also left multiple operational security weaknesses, including exposed Telegram bot tokens and C2 endpoints with missing authentication.

    Related:‘The Gentlemen’ Rapidly Rises to Ransomware Prominence

    How to Avoid ClickFix Compromise

    While Any.Run’s blog contains indicators of compromise, it must also be noted that no matter how sophisticated an attack chain may seem, ClickFix only works if the end user runs a command or downloads a file. 

    As such, the best way for organizations to combat ClickFix is to educate leaders and employees on how the technique works and why it’s successful, and not to run suspicious commands or open files as a means to solve connectivity problems. 

    Aleksey Lapshin, CEO of Any.Run, tells Dark Reading that Mac users in particular should be trained out of the illusion of safety many have, based on a history of being told “Macs don’t get malware.” Organizations should also actively track ClickFix samples in the wild and feed the actual commands back into EDR rules and execution policies. Finally, log and restrict high-risk commands on endpoints like curl, wget, osascript, and bash; the CEO says many organizations don’t monitor this at all, especially on macOS.

    “Attackers always look for the cheapest entry point with the highest hit rate. Breaking through the outer moat of enterprise security, such as email gateways, EDR, perimeter filtering, gets more expensive every year, so they’re picking new paths,” Lapshin says. “And the cheapest path right now is one where the attacker is literally the user, voluntarily executing commands on their own machine.”

    ClickFix Koreas Lazarus macOS North Targets Users
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThis duster changed the way I clean my gear, and now you can grab one for cheap
    Next Article 8 SEO tasks you shouldn’t do manually
    admin
    • Website

    Related Posts

    Compromised everyday devices power Chinese cyber espionage operations

    April 25, 2026

    Windows Update gets new controls to reduce forced restarts

    April 25, 2026

    Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google Clock 8.8 APK Download by Google LLC

    April 25, 2026

    Compromised everyday devices power Chinese cyber espionage operations

    April 25, 2026

    Why Great Content Is No Longer Enough & What Beats It In AI Search

    April 25, 2026

    Windows Update gets new controls to reduce forced restarts

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,504)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (923)
    • Tech Tools & Mobile / Apps (1,788)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google Clock 8.8 APK Download by Google LLC

    April 25, 2026

    Compromised everyday devices power Chinese cyber espionage operations

    April 25, 2026

    Why Great Content Is No Longer Enough & What Beats It In AI Search

    April 25, 2026
    Most Popular
    • Google Clock 8.8 APK Download by Google LLC
    • Compromised everyday devices power Chinese cyber espionage operations
    • Why Great Content Is No Longer Enough & What Beats It In AI Search
    • Windows Update gets new controls to reduce forced restarts
    • Melitta AromaFresh Therm Pro review: an almost-great drip coffee maker that’s let down by its most novel feature
    • Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise
    • 8 SEO tasks you shouldn’t do manually
    • North Korea’s Lazarus Targets macOS Users via ClickFix
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.