T-Mobile will give you an iPhone 17 basically for free – here’s how to get yours

Here’s how to pick an iPhone 17 series phone for free at T-Mobile.

Latest news – ​Read More

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

The hackers targeted LayerZero’s DVN, compromising certain RPCs and DDoSing others to trigger failover to the poisoned infrastructure.  

The post $290 Million Kelp DAO Crypto Heist Blamed on North Korea appeared first on SecurityWeek.

SecurityWeek – ​Read More

Bad Apples: Weaponizing native macOS primitives for movement and execution

  • As macOS adoption grows among developers and DevOps, it has become a high value target; however, native “living-off-the-land” (LOTL) techniques for the platform remain significantly under-documented compared to Windows. 
  • Adversaries can bypass security controls by repurposing native features like Remote Application Scripting (RAS) for remote execution and abusing Spotlight metadata (Finder comments) to stage payloads in a way that evades static file analysis. 
  • Attackers can move toolkits and establish persistence using built-in protocols such as SMB, Netcat, Git, TFTP, and SNMP operating entirely outside the visibility of standard SSH-based telemetry. 
  • Defenders should shift from static file scanning to monitoring process lineage, inter-process communication (IPC) anomalies, and enforcing strict MDM policies to disable unnecessary administrative services.

Bad Apples: Weaponizing native macOS primitives for movement and execution

As macOS adoption in the enterprise reaches record highs, with over 45 percent of organizations now utilizing the platform, the traditional “security through obscurity” narrative surrounding the OS has been rendered obsolete. Mac endpoints, once relegated to creative departments, are now the primary workstations for developers, DevOps engineers, and system administrators. Consequently, these machines have become high-value targets that serve as gateways to source code repositories, cloud infrastructure, and sensitive production credentials. 

Despite this shift, macOS-native lateral movement and execution tradecraft remain significantly understudied compared to their Windows counterparts. This research was conducted to address this critical knowledge gap. Through a systematic validation of native macOS protocols and system binaries, it is demonstrated how adversaries can “live off the land” (LOTL) by repurposing legitimate administrative tools. By weaponizing native primitives, such as Remote Application Scripting (RAS) and Spotlight metadata, intentional OS security features can be bypassed to transform standard system functions into robust mechanisms for arbitrary code execution and fleet-wide orchestration.

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 1. macOS living-off-the-land (LOTL) attack flow.

The macOS enterprise blind spot 

macOS is no longer a niche operating system. According to the Stack Overflow 2024 Developer Survey, a third of professional developers use macOS as their primary platform. These machines represent high-value pivot points, often holding source code repositories, cloud credentials, and SSH keys to production infrastructure. 

Despite this trend, the MITRE ATT&CK framework documents far fewer techniques for macOS than for Windows, and recent industry reports indicate that macOS environments prevent significantly fewer attacks than their Windows or Linux counterparts. To address this disparity, community-driven resources such as LOOBins (living-off-the-orchard binaries) have emerged to catalog native macOS binaries that can be repurposed for malicious activity. This research aims to further close that gap by systematically enumerating the native pathways available for both movement and execution.

Remote command execution: Weaponizing native primitives 

Establishing a remote shell is the first step in any post-exploitation chain. While SSH is the standard, native macOS features provide several alternatives that can bypass traditional monitoring. 

Remote Application Scripting as a Software Deployment Tool (T1072) 

Remote Application Scripting (formerly known as Remote Apple Events or RAE) was introduced to extend the capabilities of the AppleScript Inter-Process Communication (IPC) framework across a network. By utilizing the Electronic Program-to-Program Communication (“eppc”) protocol, administrative tasks and application automation can be performed on remote macOS systems. This mechanism allows a controller machine to send high-level commands to a target machine, which are then processed by the “AppleEventsD” daemon. 

The Open Scripting Architecture (OSA) is utilized as the standardized framework for this inter-application communication and automation on macOS. Through the exchange of Apple Events, this architecture enables scripts to programmatically interact with the operating system and installed applications, providing the functional foundation for the “osascript” utility. 

Traditionally, RAE is viewed as a lateral movement vector; however, this research demonstrates that it can also be utilized as a standalone Software Deployment Tool for Execution (T1072)

Adversaries attempting to use RAE for complex payloads often encounter Apple’s intentional security features, specifically the -10016 Handler Error. This restriction prevents the “System Events” application from executing remote shell commands via do shell script, even when RAE is globally enabled.

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 2. The -10016 Handler Error in remote application scripting.

To bypass this, a methodology was developed that treats “Terminal.app” as an execution proxy. Unlike “System Events”, “Terminal.app” is designed for shell interaction and accepts remote “do script” commands. To ensure payload integrity and bypass AppleScript parsing limitations (such as the -2741 syntax error), Base64 transport encoding is utilized. This transforms multi-line scripts into flat, alphanumeric strings that are decoded and executed in a two-stage process: 

  1. Deployment: A single RAE command instructs the remote “Terminal.app” to decode the Base64 string into a temporary path and apply chmod +x
  2. Invocation: A second RAE command explicitly invokes the script via “bash”, ensuring a proper shell context.
Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 3. Terminal.app as an execution proxy for Base64 payloads.

Remote Application Scripting for Lateral Movement (T1021.005) 

While RAE can be weaponized for execution, its primary function remains the facilitation of inter-process communication (IPC) across a network. In a lateral movement context, RAE is utilized to control remote applications by targeting the “eppc://” URI. This allows for the remote manipulation of the file system or the retrieval of sensitive environmental data without the need for a traditional interactive shell. 

For example, the command in Figure 4 can be used to remotely query the Finder for a list of mounted volumes on a target machine, providing an adversary with immediate insight into the victim’s network shares and external storage:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 4. Remotely querying mounted volumes via RAE.

Because these actions are performed via Apple Events rather than standard shell commands, they often bypass security telemetry that focuses exclusively on process execution trees, making RAE a discreet and effective vector for lateral movement.

AppleScript execution via SSH 

AppleScript is macOS’s built-in scripting language for automation. While RAE is a viable application control mechanism, Apple security controls prevent RAE from launching applications; they must already be running. Additionally, RAE must be enabled on the target. To circumvent these obstacles, osascript can be invoked directly over SSH. 
 
Passing osascript the system info command over SSH returns critical environmental details:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 5. Retrieving system information via osascript over SSH.

For arbitrary command execution, AppleScript’s do shell script handler can be invoked over SSH. In the following example, do shell script is used to write a file to the target:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 6. Arbitrary file creation using do shell script over SSH. 

While SSH alone can accomplish shell tasks, osascript provides access to graphical user interfact (GUI) automation and Finder manipulation through Apple Events IPC rather than spawning shell processes. This creates a significant telemetry gap, as most endpoint detection tooling has less visibility into IPC-driven actions than standard shell process trees.

socat remote shell 

socat (SOcket CAT) is a command line utility for establishing bidirectional data streams between two endpoints. It supports a wide range of socket types including TCP, UDP, Unix domain sockets, and pseudo terminals (pty). 

In a lateral movement context, socat can establish an interactive shell on a target without relying on SSH. The target runs a listener that binds a login shell to a TCP port with pty allocation, and the attacker connects to it from a remote machine. 

On the target, the listener spawns an interactive bash session for each incoming connection with pty forwarding:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 7. Establishing a listener with PTY forwarding on the target. 

From the attacking machine, connecting to the listener provides a fully interactive terminal: 

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 8. Attacker connection to the socat listener.

On the target, the reuseaddr,fork options allow multiple connections and reuse of the port, while pty,stderr on the exec gives the connecting client a proper terminal with stderr output. On the sender side, raw,echo=0,icanon=0 puts the local terminal into raw mode so that control characters and signals pass through to the remote shell correctly. 

SSH is the de facto mechanism for gaining remote shell access on remote hosts, and as a result, it is where most detection engineering efforts are focused. socat achieves the same outcome, fully interactive terminal access, but operatesentirely outside the SSH ecosystem. There are no sshd logs, PAM authentication events, or “authorized_keys” to manage, which means detection pipelines built around SSH telemetry would not catch this activity.

Covert data transfer: Finder metadata abuse 

A notable constraint of RAE is its inability to write file contents directly. To work around this, we can abuse the Finder Comment (“kMDItemFinderComment”) field, which is stored as Spotlight metadata. 

Writing payloads to Finder Comments 

A notable constraint of RAE is its inability to write file contents directly. To circumvent this, threat actors can abuse the Finder Comment field (“kMDItemFinderComment”) — a component of Spotlight metadata stored as an extended attribute. By storing a payload within metadata rather than the file’s data fork, they can bypass traditional file-based security scanners and static analysis tools, which typically focus on executable code and script contents. 

Because Finder is scriptable over RAE, the comment of a file on a remote machine can be set via the “eppc://” protocol. By Base64 encoding a payload locally, a multi-line script can be stored within this single string field. The make new file command handles the creation of the target file, ensuring that no pre-existing file is required:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 9. Setting Finder comments via RAE for payload staging.

The payload resides entirely within the Spotlight metadata, a location that remains largely unexamined by standard endpoint detection and response (EDR) solutions. This creates a stealthy staging area where malicious code can persist on the disk without triggering alerts associated with suspicious file contents. 

Extraction and execution 

On the target, extraction and execution is a single line. mdls reads the comment, base64 -D decodes it, and the result is piped to “bash”: 

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 10. Extraction and execution of metadata-stored payloads.

Persistence via LaunchAgent 

This approach can be paired with a LaunchAgent for persistence. A plist in “~/Library/LaunchAgents” that executes the extraction chain at user login allows the payload to run automatically. 

Our initial attempt using mdls inside the LaunchAgent failed because Spotlight may not be fully initialized when LaunchAgents fire. The fix was to replace mdls with osascript calling Finder directly to read the comment:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 11. Persistence via LaunchAgent and Finder metadata. 

Talos confirmed this successfully executes the payload at login. It is worth noting that macOS prompts the user to approve the bash execution at login, which is a visible indicator of background activity. The plist contains no payload, only a reference to metadata, so static analysis of the LaunchAgent would not reveal the malicious content. 

Lateral Tool Transfer techniques 

Once attackers achieve execution, they must move their toolkit across the environment. Several native protocols were validated for tool transfer (T1570). 

Standard protocols: SCP and SFTP 

SCP (Secure Copy Protocol) and SFTP (SSH File Transfer Protocol) are the most straightforward methods, operating over SSH and available out-of-the-box on any macOS system with Remote Login enabled.

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 12. SCP file transfer syntax.
Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 13. SFTP file transfer syntax.

SMB-based transfer 

Server Message Block (SMB) is a network file sharing protocol commonly associated with Windows environments, but macOS includes native support for both SMB client and server functionality. In a lateral movement context, an attacker can mount a remote SMB share and access its contents as if they were local files. 

This method of setting up an SMB share on the victim requires SSH access. The following command creates a shared directory, loads the SMB daemon, and creates the share.

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 14. Configuring a native SMB share on macOS.

With the share created, the next step is mounting it from the attacker machine. Attempting this action with the mount command failed due to an authentication error.

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 15. Authentication error encountered during SMB mount.

To resolve this issue, GUI access to the victim machine was required. On the victim machine, navigate to System Settings > General > Sharing > File Sharing > Options. Located here is the option to store the user’s account password on the computer. Even though this is labeled as “Windows File Sharing”, it was required to properly authenticate the user when using the mount utility. 

However, this entire GUI dependency can be avoided by using osascript to mount the share instead of mount:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 16. Mounting SMB shares via osascript.

This mounts the share to “/Volumes/share” without requiring the GUI configuration step. With the share mounted, any file copied into the mount directory appears on the victim immediately. 

Netcat-based transfer 

nc (netcat) is a well-known general-purpose networking utility that ships with macOS. It can be utilized to open arbitrary TCP and UDP connections, listen on ports, and pass data between them. 

The simplest pattern involves piping commands directly into a netcat listener. On the target, a listener is established that pipes incoming data directly to sh:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 17. Netcat listener established on victim machine.

From the attacking machine, a command is then echoed into nc targeting the victim’s IP and port:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 18. Command execution via Netcat (attacker side).
Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 19. Command execution via Netcat (victim side).

The attacker sends the curl google.com command over the wire, which is caught by the victim’s listener and executed by sh. The resulting output confirms successful execution on the target. 

Netcat can also facilitate file transfers through several different methods. An attacker could invoke a fetch to a remote system where a script or payload is hosted, or start a simple HTTP server on their own machine to perform ad hoc tool transfer.

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 20. Serving files via netcat (Attacker Terminal 1).
Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 21. Initiating file transfer via Netcat (Attacker Terminal 2).

Git-based transfer 

git is a version control system ubiquitous in software development. Its prevalence on developer machines and reliance on SSH as a transport make git push a practical file transfer mechanism. The technique requires initializing a repository on the target and setting receive.denyCurrentBranch updateInstead. By default, git refuses pushes to a branch that is currently checked out on the remote. This setting overrides that behavior and updates the working tree on push, landing files on disk the moment the operation completes. 

First, a receiving repository is initialized on the target over SSH:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 22. Initializing a Git repository on the target.

On the attacker, a local repository is created with the payload, and the remote is pointed at the target:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 23. Pushing payloads to the target via Git. 

After the push, “script.sh” exists on the target at “~/repos/project/script.sh”. Additional file transfers only require adding new files, committing, and pushing again. Because git operates over SSH, the transfer is encrypted and uses the same authentication established for command execution. 

TFTP (Standard and unprivileged) 

TFTP (Trivial File Transfer Protocol) is a lightweight, unauthenticated file transfer protocol that operates over UDP. macOS includes both a TFTP server and client. The server is not active by default but can be started through launchd

With root access on the target, the system’s built-in TFTP plist activates the server in a single command:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 24. Activating the native TFTP server.

This serves “/private/tftpboot” on the standard TFTP port (UDP 69). The TFTP system plist does not provide the -w flag to the tftpd process. Without it, the server only allows writes to files that already exist. A placeholder file must be created on the target for each file being transferred:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 25. Creating a placeholder file for TFTP transfer.

From the attacker, the payload is pushed to the target: 

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 26. Pushing payload to target via TFTP.

In a post-exploitation scenario without root access, tftpd can still be deployed by loading a user-created plist from “/tmp” on a non-standard port. This variant passes the tftpd -w flag, which allows write requests to create new files, removing the placeholder requirement. 

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 27. Non-root TFTP server deployment.

SNMP trap-based transfer 

SNMP (Simple Network Management Protocol) is used for monitoring and managing network devices. SNMP traps are unsolicited notifications sent from agents to a management station over UDP port 162. The trap payload can carry arbitrary string data under custom OIDs, which can be repurposed as a data transfer channel. macOS ships with the necessary net-snmp tools: snmptrap (“/usr/bin/snmptrap”) on the sender and snmptrapd (“/usr/sbin/snmptrapd”) on the receiver. 

The approach works by Base64 encoding a file, splitting it into fixed-size chunks, and sending each chunk as an SNMP trap payload under a custom OID in the private enterprise space (“1[.]3[.]6[.]1[.]4[.]1[.]99999”). A trap handler on the receiving end reassembles the chunks and decodes the file. The protocol uses three message types: “FILENAME” signals the start of a transfer, “DATA” carries a Base64 chunk, and “END” triggers reassembly. 

On the receiver, a trap handler processes incoming traps:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 28. SNMP trap handler logic.

The snmptrapd daemon is then configured on the target to route all incoming traps to the handler and started in the foreground:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 29. Configuring the snmptrapd daemon.

On the sender, a script handles the encoding, chunking, and transmission. Each chunk is sent as a separate SNMP trap with a short delay between sends to avoid overwhelming the receiver:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 30. Script for SNMP chunking and transmission. 

The sender initiates the transfer: 

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 31. Initiating data transfer via SNMP traps.

The target receives the transfer:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 32. Successful payload reassembly on target.

The matching MD5 hashes confirm the file was transferred and reassembled intact. 

Socat file transfer 

The socat shell established in the above “socat remote shell” section can also serve as a file transfer channel. Because the listener provides a fully interactive bash session, file contents can be written to the remote host by injecting a heredoc through the connection. This means socat alone handles both remote command execution and tool transfer without requiring any additional services or listeners. 

With the socat listener running on the target, the attacker delivers a file by piping a heredoc-wrapped cat command through a socat connection:

Bad Apples: Weaponizing native macOS primitives for movement and execution
Figure 33. File delivery via socat heredoc injection.

Detection and defensive considerations 

Defending against LOTL techniques requires a shift from simple network alerts to granular process and metadata analysis. 

Network indicators 

Inbound TCP traffic on port 3031 (the “eppc” port) and unusual SNMP/TFTP traffic on internal LAN segments should be monitored for potential unauthorized activity. 

Endpoint indicators (EVM) 

Through mapping to the Open Cybersecurity Schema Framework (OCSF), an open-source effort to deliver a simplified and vendor-agnostic taxonomy for security telemetry, high-fidelity signatures for these behaviors were identified: 

  • Suspicious lineage: Process trees following the pattern launchd -> AppleEventsD -> Terminal -> sh/bash
  • Metadata monitoring: Frequent or unusual calls to mdls or writes to “com.apple.metadata:kMDItemFinderComment”. 
  • Command line anomalies: base64 --decode commands originating from GUI applications or osascript executions containing “of machine “eppc://…”” arguments. 

Native security controls and hardening recommendations 

Several built-in macOS security mechanisms can be configured to mitigate the risks associated with native primitive abuse: 

  • Transparency, Consent, and Control (TCC) restrictions: The “Automation” category within TCC is designed to regulate inter-application communication. By enforcing strict TCC policies via Mobile Device Management (MDM), unauthorized Apple Events between applications — such as a script attempting to control “Terminal.app” or “Finder” — can be blocked. 
  • MDM Policy Enforcement: RAE and Remote Login (SSH) should be disabled by default across the fleet. These services can be managed and restricted using MDM configuration profiles (e.g., the “com.apple.RemoteAppleEvents”payload) to ensure they are only active on authorized administrative hosts. 
  • Service hardening: Unnecessary network-facing services, such as tftpd and snmpd, should be explicitly disabled. The removal of these launchd plists from “/System/Library/LaunchDaemons” (where permitted by System Integrity Protection) or the use of launchctl disable commands prevents their use as ad-hoc data transfer channels. 
  • Application firewall and Stealth Mode: The built-in macOS application firewall should be enabled and configured in “Stealth Mode.” This configuration ensures the device does not respond to unsolicited ICMP or connection attempts on common ports, reducing the visibility of the endpoint during internal reconnaissance. 

Conclusion 

The research presented in this article underscores a fundamental reality of modern endpoint security. The same primitives designed for administrative convenience and system automation are often the most potent tools in an adversary’s arsenal. By moving beyond traditional exploit-based attacks and instead LOTL, attackers can operate within the noise of legitimate system activity.

From the weaponization of the “eppc” protocol to the creative abuse of Spotlight metadata and SNMP traps, it is clear that the macOS attack surface is both vast and nuanced. These techniques demonstrate that even within a “walled garden” ecosystem, native pathways for movement and execution remain accessible to those who understand the underlying architecture. 

For defenders, the primary takeaway is that visibility remains the most effective deterrent. By shifting focus from static file analysis to the monitoring of process lineage, inter-process communication, and metadata anomalies, these “bad Apples” can be identified and neutralized. As macOS continues its expansion into the enterprise core, the documentation and detection of these native techniques must remain a priority for the security community. 

Cisco Talos Blog – ​Read More

New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses

Editor’s note: The research is authored by Mauro Eldritch, offensive security expert and a founder of BCA LTD, a company dedicated to threat intelligence and hunting. You can find Mauro on X. 

The recent wave of ClickFix attacks has introduced several new ways to compromise users, establishing itself as a technique that is likely here to stay. We have observed Lazarus Group using this method to distribute a range of malware, from well-known families to more unusual variants such as PyLangGhostRAT, a Python-based vibe-ported of the original Go version, along with other oddities. 

In this article, we analyze the next stage of this campaign: a newly identified macOS malware kit that is currently being actively distributed. 

Key Takeaways 

  • What’s happening: Lazarus Group is running an active campaign using fake meetings and social engineering to steal credentials and data. 
  • Who is targeted: Employees and business leaders communicating via Telegram and external partners. 
  • How access is gained: Users are tricked into executing commands under the guise of fixing meeting issues. 
  • What tools attackers are using: A new macOS malware kit, Mach-O Man, built as native binaries to target macOS environments. 
  • What attackers are after: Credentials and active sessions that allow immediate access to business systems. 
  • How data is exfiltrated: Sensitive data is sent via Telegram, blending into normal communication traffic.  
  • What this leads to: Account takeover, financial loss, and exposure of business-critical data. 

New Lazarus ClickFix macOS Campaign: Why Companies Are at Risk 

Lazarus Group is actively running a campaign that turns routine business communication into a direct path to credential theft and data loss. 

The attack targets business leaders through Telegram, often using compromised accounts of colleagues or contacts. Victims receive what appears to be a legitimate meeting invitation and are redirected to a fake collaboration platform that mimics Zoom, Microsoft Teams, or Google Meet. The scenario is familiar and urgent, which lowers suspicion and increases the likelihood of interaction. 

Messages sent by Lazarus operatives. Credit: Bitso Quetzal Team 

Instead of exploiting a technical vulnerability, the attackers rely on a simple instruction. The user is prompted to “fix” a connection issue by copying and executing a command. This step shifts control to the attacker without triggering many traditional security controls, because the action is performed by the user themselves. 

From that moment, the operation is focused on extracting business value as quickly as possible. The attacker collects credentials, browser sessions, and system-stored secrets, including macOS Keychain data. These assets provide immediate access to corporate systems, SaaS platforms, and financial resources. 

Telegram is used again as an exfiltration channel, allowing stolen data to be transferred through a legitimate service that blends into normal traffic.  

By the time the activity is recognized as malicious, credentials may already be compromised and sensitive data already exfiltrated. At that point, the organization is dealing with: 

  • Unauthorized access to business systems and accounts  
  • Financial loss through fraudulent transactions or misuse of access  
  • Exposure of sensitive data leading to regulatory and reputational impact 

At the core of this operation is a newly identified macOS malware kit, “Mach-O Man”, discovered by the Quetzal Team. Built as a set of Go-based Mach-O binaries, it reflects a shift toward native macOS threats. The following sections break down how this kit operates across each stage of the attack chain. 

Technical Analysis of the Mach-O Man Kit 

The Stager 

As described earlier, in this ClickFix campaign, the victim is invited to a meeting via Telegram, typically by a compromised contact sharing a link.  

The full malware kit with all its components and variants

When the user visits it, they are taken to a site impersonating a legitimate meeting platform such as Zoom, Meet, or Teams. The page then displays a fake error message claiming that, to resolve the issue, the user must copy and paste a command into their terminal. 

Thanks to ANY.RUN’s Interactive Sandbox, we can safely execute this command and observe the malicious behavior inside a secure macOS VM, without risk to our systems.  

See live sandbox analysis of fake Mach-O Man kit apps 

Fake Mach-O Man Kit apps shown inside ANY.RUN’s sandbox

Trusted by 15,000 organizations worldwide, including 74 Fortune 100 companies, ANY.RUN accelerates triage & response by enabling SOC teams to analyze URLs and files within a private, real-time virtual environment, reproducing the full attack flow across Windows, macOS, Linux, and Android.  

The result is faster, more consistent decisions across the SOC, with earlier identification of threats, reduced response time, and lower risk of incidents escalating into financial and operational impact. 

Close blind spots and reduce breach risks in your company.
Integrate ANY.RUN’s sandbox for early threat detection. 



Contact us


Pasting and running the command in the terminal leads to the installation of malware. In this case, it executes teamsSDK.bin, the stager and initial component of the Mach-O Man kit. 

When executed in our laboratory, we observed an interesting behavior: when run without arguments, the binary displays a usage message indicating how to activate it and revealing support for impersonating Google, Zoom, Teams, and “System”. 

Fun fact: if you try to choose Google, it politely states that it is “not yet implemented”. A surprisingly polished touch. 

Stager teamsSDK.bin usage

When invoked correctly, it downloads a fake macOS Application impersonating one of the previously mentioned platforms, with “System” referring to generic macOS system prompts presented to the user. To ensure execution, the malware uses macOS’ codesign utility to apply an ad-hoc signature to the application bundle, making it appear properly signed to the system. 

All applications are virtually identical, differing only in minimal visual cues. They prompt the user for their password in broken English three times in a row. 

Fake Teams App prompts for user credentials 

The first two attempts always shake the window, indicating that the password is incorrect (even if not), while the third one disappears as if the authentication had succeeded. 

Independently, at the end they all display Zoom’s logo along with a message stating that the installation was successful. 

Zoom logo displayed on the fake Teams App 

Running them interactively from the shell reveals errors during execution. Many interesting failures will be discussed throughout the analysis of the remaining components, suggesting that exhaustive testing was not conducted. 

Most modules present faulty functions or unexpected errors

In the background, the next stage is downloaded, typically named in the format D1{??????}.bin. Some examples we were able to retrieve include D1YrHRTg.bin, D1yCPUyk.bin, and D1ozPVNG.bin. At the same time, the malware performs basic fingerprinting via sysctl queries, collecting information such as CPU details and system boot time. 

Basic host fingerprinting 

Let’s check the next stage. 

The Profiler 

This second binary, D1YrHRTg.bin (or any other variant you are able to retrieve), acts as a system profiler. It registers the host with the C2 and sends a system profile. 

The first notable behavior is that, when executed without arguments, it once again displays a usage message, a rather kind gesture. 

Most modules contain a usage message

This module relies on sysctl and local userland tools to build a comprehensive profile of the host, including hostname, a unique identifier, CPU type, boot time, operating system details, network configuration, running processes, and a list of browser extensions, with dedicated targeting of Brave, Vivaldi, Opera, Chrome, Firefox, and Safari. 

Speed up triage & response workflows in your SOC.
Validate alerts and analyze artifacts with ANY.RUN. 



Sign up


This information is written to a text file and sent to the C2 server. 

The TXT file broadcasted to the C2 Server

As previously noted, some of these modules are faulty.  

This one, in particular, exhibits a self-sabotaging behavior, occasionally entering an endless loop that repeatedly posts the system profile text file to the C2 server, exhausting system resources and making its presence quite obvious to the victim. 

Repeated curl commands posting the same file 

Next, a new binary called minst2.bin is retrieved from the /payload C2 endpoint, marking the beginning of the persistence stage. 

The Persistence Mechanism 

minst2.bin was slightly trickier to debug, as it does not come bundled with a usage helper, so I had to manually fine-tune both the number and type of arguments required. After reverse engineering how the previous stage invokes it, I found that it takes the machine UUID, a payload URL, and a filename as arguments, and proceeds to download a remote file named localencode, saving it locally as OneDrive and setting it up to run at as a startup item. 

A Bash service is created for persistence 

To achieve this, it creates a folder called “Antivirus Service”, where it stores this binary, and sets up a LaunchAgent, the macOS equivalent of a Windows Service, to execute it at startup. From that point on, it re-invokes the malware kit at every login. 

The LaunchAgent 

Moving on to the final stage, this script cleans up by deleting all ZIP files and downloaded fake applications (*.app) from the temporary directory. The parent process then proceeds to download the final binary in the kit: macrasv2. 

The Stealer 

Obtained from the same /payload endpoint, macrasv2 is the final stealer and the main component of the chain.  

See sandbox analysis of macrasv2 

It stages all previously collected data, including, but not limited to, browser extension data, stored browser credentials and cookies (typically kept in SQLite databases), macOS Keychain entries, and other files of interest, consolidating them into a temporary directory. Since this is an empty laboratory, the number of staged files is relatively small. 

Final staging directory 

From there, the data is archived into a file named user_ext.zip, preparing it for exfiltration. 

ZIP file ready to be exfiltrated 

Exfiltration is carried out through a familiar channel, Telegram. In this case, however, the operators exposed their bot token, effectively allowing third parties to interact with the bot. This not only weakens their operational security but also simplifies reporting and potential takedown efforts. 

Telegram Bot/API Key is leaked

This makes it trivial to both read the bot’s messages, send messages on its behalf, and even identify its owner. 

Operator identified via leaked Bot Key 

Finally, the malware invokes a self-deletion script named delete_self.sh, which simply removes itself and other components using the system’s rm command. 

Self-deletion routine 

With this, the full infection cycle is complete. Thanks to ANY.RUN’s macOS analysis capabilities, we were able to fully reconstruct it in record time. It is worth noting that this is a novel (previously unseen) malware, which would typically require significantly more time to disassemble and analyze using traditional methods. 

Let’s now move on to the ATT&CK Matrix, followed by the IOCs and other interesting details. 

Additional Observations 

  • The malware is badly written, with certain components entering infinite loops that may expose its presence due to system resource starvation.  
  • Operational security weaknesses were identified, such as exposed Telegram bot tokens and C2 endpoints with missing authentication.  
  • The use of ad-hoc code signing indicates an attempt to bypass macOS execution controls without valid developer credentials.  
  • Network traffic analysis shows that the malware primarily communicates over ports 8888 and 9999. Additionally, HTTP requests consistently use a User-Agent string associated with the Go programming language (e.g., Go-http-client), which aligns with other observed components of the toolset.  
  • The adversary’s infrastructure exposed multiple services, including WinRM, Chrome Remote Desktop, Remote Desktop Protocol (RDP), and a replica of the C2 server running on port 110.  
  • Reverse engineering analysis indicates that multiple components of the malware are written in Go. This is supported by the presence of Go-specific strings and referenced artifacts within the binaries, including characteristic function naming conventions, runtime structures, and the use of the standard Go HTTP client in network communications.  

Defending Against Lazarus Attacks: How CISOs Can Minimize Risk 

Trust-abuse phishing, exemplified by campaigns like Mach-O Man, exploits legitimate platforms to bypass conventional security measures. Attackers manipulate human psychology with urgent meeting requests or fake technical issues, tricking users into executing malicious commands or disclosing credentials.  

For SOC teams, the difficulty lies in detecting these attacks early, as they often slip past signature-based defenses by leveraging trusted services and user-driven actions. 

Close Detection Gaps with Stronger Cross-Platform Triage 

To combat these threats, SOCs must adopt interactive sandboxing as a cornerstone of their triage process. Unlike automated solutions, ANY.RUN eliminates critical blind spots for security teams by enabling analysis of malicious files and URLs across Windows, macOS, Linux, and Android in a single interface.  

ANY.RUN’s sandbox delivers fast verdicts on malicious files and URLs

Instead of juggling separate solutions for each OS, SOC teams gain a unified sandbox environment where they can manually simulate user interactions, uncover hidden attack stages, and capture behavioral IOCs, such as unusual sysctl queries in macOS or Mach-O binary execution.  

For business processes, this means streamlined triage, reducing analysis time and integrating seamlessly with SIEM/SOAR for automated threat investigations.  

ANY.RUN delivers full attack context (process chains, network connections, system changes), which is especially critical for companies with hybrid infrastructures (corporate Windows, macOS for developers/designers, Linux servers, and employee Android devices), where traditional sandboxes cover only part of the risk. 

Reduce MTTR by 21 minutes in your SOC.
Upgrade Tier 1 productivity with ANY.RUN. 



Contact us


When integrated into your SOC workflows, ANY.RUN’s Sandbox delivers measurable impact, enabling security teams to: 

  • Identify Credential Exposure Earlier: Detect threats in under 60 seconds and reduce breach probability before escalation begins  
  • Reduce MTTR: Achieve up to 21 minutes faster response time and 50% quicker IOC extraction  
  • Detect More Relevant Threats: Identify up to 58% more threats with real-time, sandbox-verified intelligence  
  • Minimize High-Severity Incidents: Earlier detection lowers escalation rates and limits impact on business operations  
  • Improve SOC Efficiency Without Hiring: Increase team performance up to 3x and reduce Tier 1 workload by 20% 

 
For businesses, this means fewer breaches, lower financial impact per incident, and more predictable security outcomes. Organizations gain control over both risk exposure and operational costs, rather than reacting after damage occurs. 

About ANY.RUN 

ANY.RUN helps over 15,000 organizations and 600,000 security professionals identify and understand threats before they turn into incidents. 

The solutions combine interactive sandbox analysis and real-time threat intelligence into a single workflow, allowing SOC teams to analyze files and URLs, observe full attack behavior, and make faster, more accurate decisions. Instead of relying on delayed indicators or assumptions, analysts see what the threat actually does and what risk it creates for the business. 

By strengthening monitoring, triage, and response, ANY.RUN enables organizations to detect more threats earlier, reduce response time, and limit the impact of credential theft, data exposure, and account compromise. 

The result is a more predictable and efficient SOC, where decisions are made faster, incidents are contained earlier, and business risk is reduced. 

IOCs and TTPs 

Network IOCs 

IP Addresses 

  • 172[.]86[.]113[.]102  
  • 144[.]172[.]114[.]220  

Domains 

  • update-teams[.]live  
  • livemicrosft[.]com  

URLs 

  • h[tt]p://172[.]86[.]113[.]102/Onedrive  
  • h[tt]ps://update-teams[.]live/teams  
  • h[tt]p://172[.]86[.]113[.]102/localencode  
  • livemicrosft[.]com/meet/89035563931?p=9jXK14VFM8fObdKxfkake8tD7rPhzs.1  

File-based IOCs 

File Names 

  • localencode  
  • OneDrive  
  • teamsSDK.bin  
  • D1YrHRTg.bin  
  • D1yCPUyk.bin  
  • minst2.bin  
  • macrasv2  

File Paths 

  • /Users/$USER/.local/bin/OneDrive  
  • ~/Library/.initialized  
  • ~/Library/LaunchAgents/com.onedrive.launcher.plist  
  • ~/Library/LaunchAgents/com.onedrive.launcher.tmp  
  • $TMPDIR/OneDrive  
  • $TMPDIR/geniex_client_sleep_state  
  • bin.config  

File Hashes (SHA256) 

  • eb3eae776d175f7fb2fb9986c89154102ba8eabfde10a155af4dfb18f28be1b5 (com.onedrive.launcher.plist)  
  • eb3eae776d175f7fb2fb9986c89154102ba8eabfde10a155af4dfb18f28be1b5 (com.onedrive.launcher.tmp)  
  • 0f41fd82cac71e27c36eb90c0bf305d6006b4f3d59e8ba55faeacbe62aadef90 (D1yCPUyk.bin)  
  • 0f41fd82cac71e27c36eb90c0bf305d6006b4f3d59e8ba55faeacbe62aadef90 (D1YrHRTg.bin)  
  • a9562ab6bce06e92d4e428088eacc1e990e67ceae6f6940047360261b5599614 (localencode / OneDrive)  
  • 85bed283ba95d40d99e79437e6a3161336c94ec0acbc0cd38599d0fc9b2e393c (macrasv2)  
  • cc31b3dc8aeed0af9dd24b7e739f183527d55d5b5ecd3d93ba45dd4aaa8ba260 (MauroDPRKSamples.zip)  
  • 4b08a9e221a20b8024cf778d113732b3e12d363250231e78bae13b1f1dc1495b (minst2.bin)  
  • 89616a503ffee8fc70f13c82c4a5e4fa4efafa61410971f4327ed38328af2938 (SystemApp.zip)  
  • dfee6ea9cafc674b93a8460b9e6beea7f0eb0c28e28d1190309347fd1514dbb6 (TeamsApp.zip)  
  • 871d8f92b008a75607c9f1feb4922b9a02ac7bd2ed61b71ca752a5bed5448bf3 (teamsSDK.bin)  
  • 24af069b8899893cfc7347a4e5b46d717d77994a4b140d58de0be029dba686c9 (ZoomApp.zip)  

Host-based IOCs 

Persistence Artifacts 

  • ~/Library/LaunchAgents/com.onedrive.launcher.plist  
  • ~/Library/LaunchAgents/com.onedrive.launcher.tmp  

Suspicious Directories / Files 

  • ~/Library/.initialized  
  • /Users/$USER/.local/bin/OneDrive  
  • $TMPDIR/geniex_client_sleep_state  

Code / Binary Artifacts 

Strings 

  • geniex-client/core  
  • geniex-client/protocol  
  • geniex-client/Internal/vss  
  • geniex_client_sleep_state  
  • geniex config file too short  
  • com.onedrive.launcher  
  • Die command received, initiating self-destruction  
  • hobocopy_%d  

Build Artifact 

  • GoBuildID: 
    XSnX8a5Y1OweX0Ob6lfO/ZYlrxu-H_BNvt5ptXb3c/8HR_X2LwoFzXXN4Fti_K/xaM13na_g6snvgcy0x9t  

Encryption Keys 

  • RC4Key: 
    a73ce18952b40fd621789e43c56b2af08d1497ce3560b2481fa973d8265ce491  
  • RC4Key: 
    5476bbf8ddb2fb056295f09ebe05e20a7d1cf29ea279cd4613c87544013e080fef35c97b3511ef9c0f12e505a1d805628ba10483dc9290508f94d153ee94d5c4 

ATT&CK Matrix 

Execution 

  • User Execution (T1204)  

Persistence 

  • Create or Modify System Process: Launch Agent (T1543.001)  

Privilege Escalation 

  • Abuse Elevation Control Mechanism: Sudo and Sudo Caching (T1548.003)  

Defense Evasion 

  • File and Directory Permissions Modification (T1222)  
  • Virtualization/Sandbox Evasion (T1497)  

Credential Access 

  • Credentials from Password Stores (T1555)  
  • Unsecured Credentials (T1552)  

Discovery & Collection 

  • System Information Discovery (T1082)  
  • Process Discovery (T1057)  
  • System Time Discovery (T1124)  
  • File and Directory Discovery (T1083)  
  • Data from Local System (T1005)  
  • Archive Collected Data (T1560)  

Exfiltration 

  • Exfiltration Over Web Service: Exfiltration to Cloud Storage / Web Service (T1567)  

Data is exfiltrated via Telegram bot API, using a legitimate web service to evade detection. 

References 

Original Quetzal Team Article: https://open.substack.com/pub/quetzalteam/p/north-koreas-safari-hunting-for-rats  

Original LevelBlue Labs Intelligence Pulse: https://otx.alienvault.com/pulse/69d9c62d24ae9bc8d5653f56  

Session 1: https://app.any.run/tasks/937afde2-5e3c-4eb0-a7d1-6124f0f3ed18 

Session 2: https://app.any.run/tasks/777b23e8-25ea-45b5-a998-d2e1c400c9d1 

Session 3: https://app.any.run/tasks/7f771a62-fcda-4a33-8e99-ab068fae8500 

Session 4: https://app.any.run/tasks/94b9bc1f-86 -4069-8222-1cb511d78ad9

The post New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation.
The list of vulnerabilities is as follows –

CVE-2023-27351 (CVSS score: 8.2) – An improper authentication vulnerability in PaperCut

The Hacker News – ​Read More

What the ransom note won’t say

An attack is what you see, but a business operation is what you’re up against

WeLiveSecurity – ​Read More

Vercel Employee’s AI Tool Access Led to Data Breach

Stolen OAuth tokens, which are at the root of these breaches, “are the new attack surface, the new lateral movement,” a researcher noted.

darkreading – ​Read More

Vercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved

Vercel confirms a breach linked to Context.ai as a hacker lists alleged data for $2M. ShinyHunters denies involvement and flags imposters.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

This VPN Lets You Verify Your Business Privacy For $130

VP.NET makes VPN privacy verifiable, not just policy-based, with secure enclave tech for up to five devices.

The post This VPN Lets You Verify Your Business Privacy For $130 appeared first on TechRepublic.

Security Archives – TechRepublic – ​Read More

I speed-tested Surfshark’s new ‘heavenly’ Dausos VPN protocol – how it compares to WireGuard

The new protocol was built for ‘better security and barrier-breaking speeds.’ I tested whether it can compete with WireGuard during its early phase.

Latest news – ​Read More