Malicious hackers are targeting individuals in the cryptocurrency space through a sophisticated phishing campaign that starts with a fake meeting link added to the target’s calendar at Calendly. The attackers impersonate well-known cryptocurrency investors and initiate conversations on messaging platforms like Telegram in order to schedule a video conference call. When the target clicks on the meeting link provided by the scammers, a malicious script is executed, silently installing malware on macOS systems.
One individual, who we will refer to as Doug for privacy reasons, fell victim to this scheme. Doug, who is involved in the cryptocurrency scene and was seeking investment for his startup, was contacted by someone posing as Ian Lee from Signum Capital, a reputable investment firm. The imposter expressed interest in financially supporting Doug’s startup and requested a video call to discuss investment opportunities. Doug shared his Calendly profile to schedule the meeting, but when he clicked on the meeting link, nothing happened.
After attempting to troubleshoot the technical difficulties with the imposter, Doug eventually ran a script provided by the scammer. Unbeknownst to him, this simple Apple Script was actually a trojan designed to infiltrate macOS systems. Realizing he may have been targeted in a malware attack, Doug took immediate action to secure his data by backing up important documents, changing passwords, and ultimately reinstalling macOS on his computer as a precaution.
Further investigation revealed that the malicious script downloaded by Doug was linked to a North Korean state-sponsored hacking group known as BlueNoroff, a subgroup of the infamous Lazarus hacking group. The group is known for targeting banks, cryptocurrency businesses, and other financial institutions to steal funds. The script used in this case was part of a phishing attack aimed at cryptocurrency project teams on Telegram, luring them into downloading and executing malware.
The increasing prevalence of Mac malware underscores the importance of taking proactive measures to protect against cyber threats. While macOS does include built-in antivirus technology like X-Protect, attackers are continuously evolving their tactics to bypass these security measures. Mac users are advised to exercise caution when downloading software and to verify the legitimacy of any new contacts, especially on platforms like Telegram.
As cybersecurity experts emphasize, staying vigilant and proactive is key to mitigating the risk of falling victim to phishing attacks and malware schemes. By following best practices such as verifying new contacts, avoiding suspicious links, and keeping software updated, users can significantly reduce their vulnerability to cyber threats. In the case of Doug and others targeted in similar phishing campaigns, staying informed and taking preemptive steps is crucial to safeguarding personal and sensitive information.

