The North Korean Lazarus Group has launched a new attack campaign, "Mach-O Man," targeting executives in the fintech and cryptocurrency sectors. According to CertiK, the group uses ClickFix social engineering tactics, tricking victims into executing malicious commands on their Mac terminals through fake online meeting invitations. This allows the attackers to infiltrate corporate and financial systems. Over the past two weeks, the Lazarus Group has reportedly stolen over $500 million from platforms such as Drift and KelpDAO. The "Mach-O Man" campaign employs a modular macOS malware toolkit developed by Chollima, a subgroup of Lazarus, which is designed to self-delete after execution to avoid detection. The attackers have also hijacked DeFi project domains, replacing them with counterfeit Cloudflare messages to further their campaign.