North Korea's BlueNoroff APT Targets macOS Users with New 'GhostCall' Malware

North Korean APT BlueNoroff Deploys New 'GhostCall' and 'GhostHire' Malware in Campaigns Targeting macOS Users in Crypto Sector

HIGH
October 28, 2025
5m read
Threat ActorMalwarePhishing

Related Entities

Threat Actors

Organizations

Products & Tech

macOSZoomMicrosoft TeamsTelegramGitHub

Full Report

Executive Summary

BlueNoroff (also known as APT38 or Sapphire Sleet), the financially motivated subgroup of North Korea's infamous Lazarus Group, has launched two new, highly sophisticated campaigns named 'GhostCall' and 'GhostHire'. Research from Kaspersky reveals these operations deploy a new arsenal of malware targeting macOS systems, a departure from the group's more frequent focus on Windows. The campaigns, active since at least April 2025, use elaborate social engineering lures—including fake job offers and investment opportunities enhanced with AI—to compromise executives in venture capital and developers in the Web3 and cryptocurrency industries. The ultimate goal is the theft of cryptocurrency assets.


Threat Overview

The two campaigns are part of BlueNoroff's broader 'SnatchCrypto' operation and demonstrate the group's increasing sophistication and focus on high-value targets in the financial and tech sectors.

  • GhostCall Campaign: Attackers pose as investors or entrepreneurs on Telegram and invite targets to a virtual meeting. They direct the victim to a convincing phishing page masquerading as a Zoom or Microsoft Teams website. During the fake call, which uses pre-recorded audio to appear legitimate, the attacker claims there is an audio issue and tricks the target into running a malicious script to 'fix' it. This script initiates a multi-stage infection.

  • GhostHire Campaign: This campaign targets Web3 developers with fake job offers. Attackers posing as recruiters convince the developer to download a malicious GitHub repository for a supposed skills assessment, which then deploys a payload tailored to the victim's operating system.

Kaspersky's investigation uncovered at least seven multi-stage execution chains and noted the attackers' use of AI to improve their productivity and refine their social engineering tactics.

Technical Analysis

BlueNoroff's new campaigns show a significant investment in developing malware for macOS, a platform often perceived as more secure.

  • Initial Access: The primary vector is highly targeted social engineering (T1566.002 - Spearphishing Link) delivered via platforms like Telegram.
  • Execution: The initial payload is often a malicious script downloaded from a fake meeting site or a GitHub repository.
  • Malware Suite: The infection chain deploys a suite of custom malware, including:
    • Keyloggers to capture passwords and other sensitive input.
    • A custom stealer designed to find and exfiltrate cryptocurrency wallet files, browser data, and session cookies.
    • Backdoors to provide persistent access to the compromised system.
  • Defense Evasion: The use of legitimate platforms like GitHub and convincing phishing sites for Zoom and Teams helps the attackers bypass initial suspicion. The multi-stage nature of the infection also helps to evade detection by deploying payloads piece by piece.

Impact Assessment

A successful compromise by BlueNoroff can lead to significant financial losses for both individuals and companies. By targeting venture capital executives and Web3 developers, the group aims to gain access to corporate or project treasuries containing large amounts of cryptocurrency. The impact includes:

  • Direct Financial Theft: Loss of cryptocurrency assets from personal or corporate wallets.
  • Intellectual Property Theft: Stealing proprietary code or investment strategies from Web3 projects and VC firms.
  • Reputational Damage: The association with a North Korean state-sponsored cyberattack can damage the reputation of the affected firms.

Victims have been identified in Japan, Italy, France, Singapore, Turkey, Spain, Sweden, India, Hong Kong, and Australia.

IOCs

No specific Indicators of Compromise (IOCs) were provided in the source articles.

Cyber Observables for Detection

Type Value Description
file_name Zoom.pkg or Teams.pkg from unofficial sources An installer package for Zoom or Teams downloaded from a link provided in a chat, rather than the official App Store or website.
domain Lookalike domains for zoom.us or teams.microsoft.com Phishing domains designed to mimic legitimate meeting platforms.
process_name Unsigned processes making network connections On macOS, monitor for the execution of unsigned binaries that are establishing persistent network connections or accessing keychain data.
command_line_pattern `curl -sL [URL] bash`

Detection & Response

  1. Endpoint Security for macOS: Deploy EDR solutions with strong macOS support to detect and block malicious scripts and unsigned binaries.
  2. User Awareness Training: Educate high-risk employees (executives, developers) about these specific social engineering tactics, including fake meeting invites and job offers on platforms like Telegram.
  3. Process Monitoring: On macOS, monitor for suspicious shell script execution, especially those that download additional files or attempt to escalate privileges.
  4. D3FEND Techniques:

Mitigation

  1. Software Sourcing: Enforce strict policies requiring employees to download software only from official sources, such as the Apple App Store or verified vendor websites. Never install software from a link sent via chat.
  2. Scrutinize Communications: Be highly skeptical of unsolicited contact on platforms like Telegram, especially when it involves job offers or investment opportunities. Verify the identity of the person through separate, trusted channels.
  3. Hardware Wallets: For storing significant cryptocurrency assets, use hardware wallets that keep private keys offline and are immune to malware on the host computer.
  4. Limit Privileges: Operate on user accounts with standard, non-administrative privileges for daily tasks to limit the scope of what malware can do upon execution.
  5. D3FEND Countermeasures:

Timeline of Events

1
April 1, 2025
The 'GhostCall' and 'GhostHire' campaigns are reported to have been active since at least this time.
2
October 28, 2025
This article was published

MITRE ATT&CK Mitigations

Educating high-risk users about sophisticated social engineering tactics is a critical first line of defense.

Use application control on macOS to prevent the execution of unsigned or unauthorized applications and scripts.

Mapped D3FEND Techniques:

Deploy EDR and antivirus solutions capable of detecting malicious behavior on macOS endpoints.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Given the highly targeted social engineering nature of the 'GhostCall' and 'GhostHire' campaigns, User Behavior Analysis is a key defensive technique. Security teams should implement awareness programs specifically for executives and developers in the Web3/crypto space. This training must go beyond generic phishing and cover these exact TTPs: unsolicited Telegram messages, urgent requests for meetings, and fake job offers requiring skills tests from GitHub. Technically, organizations can monitor for anomalous behavior such as a developer cloning a GitHub repository that is not part of the organization's trusted projects or an executive downloading a meeting client from a non-standard URL. Alerting on these deviations from normal behavior can provide an early warning of a targeted attack.

To defend macOS endpoints from BlueNoroff's malware, organizations should move towards an Executable Allowlisting posture. Using macOS's built-in tools or a third-party EDR, create policies that only allow signed applications from the official App Store and identified, trusted developers to execute. This would prevent the malicious, unsigned scripts and applications downloaded from the fake Zoom/Teams pages or GitHub repos from running. For developers who need more flexibility, policies can be more permissive, but should still alert on the execution of any new, unsigned code, prompting a security review. This directly counters the attacker's execution phase by ensuring only vetted software can run on the endpoint.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BlueNoroffAPT38Lazarus GroupmacOSMalwareCryptocurrencySocial EngineeringKaspersky

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading