(microsoft.com) Sapphire Sleet macOS Campaign: Social Engineering, Credential Harvesting, and Multi-Stage Payload Delivery Targeting Cryptocurrency SectorsNorth Korean APT Sapphire Sleet (aka BlueNoroff) is actively targeting macOS users in cryptocurrency, finance, and blockchain sectors via a multi-stage social engineering campaign. No CVEs—just deception.In brief - Sapphire Sleet lures targets with fake recruiter profiles and Zoom SDK update lures, harvesting credentials via fake macOS dialogs, bypassing TCC/Gatekeeper, and exfiltrating wallets, browser creds, Telegram sessions, and keychain data. Apple has deployed mitigations following coordinated disclosure.Technically - The attack begins with a compiled AppleScript lure (Zoom SDK Update.scpt) hiding malicious logic under blank lines. Execution triggers a curl-to-osascript chain (mac-cur1–5 UAs) deploying com.apple.cli, services backdoor, and icloudz (reflective loader via NSCreateObjectFileImageFromMemory). Persistence is achieved via LaunchDaemon (com.google.chromes.updaters). Credential harvesting uses systemupdate.app (dscl -authonly validation) and Telegram Bot API exfil. TCC bypass involves Finder-assisted TCC.db manipulation to grant osascript AppleEvents permissions. A 575-line AppleScript exfiltrates 7 data categories (wallets, SSH keys, Notes) over port 8443.Source: https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/#Cybersecurity #ThreatIntel