Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Target macOS with AppleScript Attacks

North Korean Hackers Target macOS with AppleScript Attacks

Posted on April 22, 2026 By CWS

North Korean cyber attackers have intensified their focus on macOS users, employing advanced social engineering tactics. These recent assaults, which aim at individuals in financial sectors, highlight the hackers’ evolving strategies to bypass security measures and steal sensitive information.

Exploiting macOS Through Social Engineering

According to recent findings by Any.Run, a notorious method known as ClickFix has been integral to these attacks. This technique involves deceiving macOS users into installing malware designed to siphon off valuable data. The attackers, posing as trusted contacts on Telegram, send fake meeting invitations to business executives, urging them to resolve fabricated connectivity issues by executing specific commands in the Terminal.

This deception results in the execution of Go-based Mach-O binaries. These binaries are part of a comprehensive malware suite, coined Mach-O Man, that harvests user credentials, Keychain secrets, and browser session data, subsequently transmitting them via Telegram.

AppleScript and State-Sponsored Hacking

Another campaign, linked to the state-sponsored group Sapphire Sleet, is leveraging AppleScript for executing code and evading detection. This group, active since at least 2020 as identified by Microsoft, has similarly been focusing on extracting sensitive information from its targets.

In these attacks, the hackers impersonate recruiters on professional networks to initiate contact with victims. They then invite these individuals to fictitious technical interviews, during which they are tricked into installing malicious software disguised as legitimate video conferencing tools or software updates.

Complex Attack Chains and Data Exfiltration

The Sapphire Sleet campaign diverges from the ClickFix approach by automating the execution of malicious commands. The downloaded file, crafted as an AppleScript, opens within macOS’s Script Editor, executing embedded shell commands without user intervention.

This sophisticated infection chain involves multiple AppleScript payloads, ultimately deploying several backdoors. The attacks are designed to secure persistence and escalate privileges. These payloads perform extensive system reconnaissance, collecting data from applications, Telegram, browser profiles, Keychain, cryptocurrency wallets, and more.

These ongoing campaigns underscore the persistent threat posed by North Korean hackers, as they continue to refine their techniques to compromise high-value targets. With their ability to adapt and employ multiple attack vectors, these hackers remain a significant concern for cybersecurity experts worldwide.

Security Week News Tags:AppleScript, cyber attack, Cybersecurity, Hacking, information theft, macOS, Malware, North Korea, Sapphire Sleet, social engineering

Post navigation

Previous Post: Critical ASP.NET Core Vulnerability Patched by Microsoft
Next Post: Namastex npm Packages Compromised with CanisterWorm Malware

Related Posts

Cyberattack on Beer Giant Asahi Disrupts Production  Cyberattack on Beer Giant Asahi Disrupts Production  Security Week News
Anatsa Android Banking Trojan Now Targeting 830 Financial Apps Anatsa Android Banking Trojan Now Targeting 830 Financial Apps Security Week News
Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities Security Week News
Vulnerabilities in CISA KEV Are Not Equally Critical: Report Vulnerabilities in CISA KEV Are Not Equally Critical: Report Security Week News
Endpoint Security Firm Remedio Raises  Million in First Funding Round Endpoint Security Firm Remedio Raises $65 Million in First Funding Round Security Week News
Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Venezuelan Energy Sector Hit by New Wiper Malware
  • DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks
  • UK Faces Rising Cyber Threats from Russia, Iran, China
  • Cross-App Permissions: Unseen Risks and Solutions
  • Global SIM Farm Network Reveals 87 Control Panels

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Venezuelan Energy Sector Hit by New Wiper Malware
  • DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks
  • UK Faces Rising Cyber Threats from Russia, Iran, China
  • Cross-App Permissions: Unseen Risks and Solutions
  • Global SIM Farm Network Reveals 87 Control Panels

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark