BlueNoroff (also known as APT38 or Sapphire Sleet), the financially motivated subgroup of North Korea's infamous Lazarus Group, has launched two new, highly sophisticated campaigns named 'GhostCall' and 'GhostHire'. Research from Kaspersky reveals these operations deploy a new arsenal of malware targeting macOS systems, a departure from the group's more frequent focus on Windows. The campaigns, active since at least April 2025, use elaborate social engineering lures—including fake job offers and investment opportunities enhanced with AI—to compromise executives in venture capital and developers in the Web3 and cryptocurrency industries. The ultimate goal is the theft of cryptocurrency assets.
The two campaigns are part of BlueNoroff's broader 'SnatchCrypto' operation and demonstrate the group's increasing sophistication and focus on high-value targets in the financial and tech sectors.
GhostCall Campaign: Attackers pose as investors or entrepreneurs on Telegram and invite targets to a virtual meeting. They direct the victim to a convincing phishing page masquerading as a Zoom or Microsoft Teams website. During the fake call, which uses pre-recorded audio to appear legitimate, the attacker claims there is an audio issue and tricks the target into running a malicious script to 'fix' it. This script initiates a multi-stage infection.
GhostHire Campaign: This campaign targets Web3 developers with fake job offers. Attackers posing as recruiters convince the developer to download a malicious GitHub repository for a supposed skills assessment, which then deploys a payload tailored to the victim's operating system.
Kaspersky's investigation uncovered at least seven multi-stage execution chains and noted the attackers' use of AI to improve their productivity and refine their social engineering tactics.
BlueNoroff's new campaigns show a significant investment in developing malware for macOS, a platform often perceived as more secure.
T1566.002 - Spearphishing Link) delivered via platforms like Telegram.A successful compromise by BlueNoroff can lead to significant financial losses for both individuals and companies. By targeting venture capital executives and Web3 developers, the group aims to gain access to corporate or project treasuries containing large amounts of cryptocurrency. The impact includes:
Victims have been identified in Japan, Italy, France, Singapore, Turkey, Spain, Sweden, India, Hong Kong, and Australia.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
| Type | Value | Description |
|---|---|---|
| file_name | Zoom.pkg or Teams.pkg from unofficial sources |
An installer package for Zoom or Teams downloaded from a link provided in a chat, rather than the official App Store or website. |
| domain | Lookalike domains for zoom.us or teams.microsoft.com |
Phishing domains designed to mimic legitimate meeting platforms. |
| process_name | Unsigned processes making network connections | On macOS, monitor for the execution of unsigned binaries that are establishing persistent network connections or accessing keychain data. |
| command_line_pattern | `curl -sL [URL] | bash` |
D3-EAL: Executable Allowlisting can prevent the execution of the malicious downloaders.D3-UBA: User Behavior Analysis could potentially flag anomalous developer behavior, such as cloning an untrusted GitHub repository.D3-ACH: Application Configuration Hardening can be applied to browsers and other clients to reduce the attack surface.D3-DO: Decoy Object, such as a fake cryptocurrency wallet file, could be used to detect and alert on stealer activity.Educating high-risk users about sophisticated social engineering tactics is a critical first line of defense.
Use application control on macOS to prevent the execution of unsigned or unauthorized applications and scripts.
Mapped D3FEND Techniques:
Deploy EDR and antivirus solutions capable of detecting malicious behavior on macOS endpoints.
Mapped D3FEND Techniques:
Given the highly targeted social engineering nature of the 'GhostCall' and 'GhostHire' campaigns, User Behavior Analysis is a key defensive technique. Security teams should implement awareness programs specifically for executives and developers in the Web3/crypto space. This training must go beyond generic phishing and cover these exact TTPs: unsolicited Telegram messages, urgent requests for meetings, and fake job offers requiring skills tests from GitHub. Technically, organizations can monitor for anomalous behavior such as a developer cloning a GitHub repository that is not part of the organization's trusted projects or an executive downloading a meeting client from a non-standard URL. Alerting on these deviations from normal behavior can provide an early warning of a targeted attack.
To defend macOS endpoints from BlueNoroff's malware, organizations should move towards an Executable Allowlisting posture. Using macOS's built-in tools or a third-party EDR, create policies that only allow signed applications from the official App Store and identified, trusted developers to execute. This would prevent the malicious, unsigned scripts and applications downloaded from the fake Zoom/Teams pages or GitHub repos from running. For developers who need more flexibility, policies can be more permissive, but should still alert on the execution of any new, unsigned code, prompting a security review. This directly counters the attacker's execution phase by ensuring only vetted software can run on the endpoint.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats