COINPURO - Crypto Currency Latest News logo COINPURO - Crypto Currency Latest News logo
Finbold 2026-04-21 14:00:00

Bybit Security exposes macOS malware campaign targeting users searching for Claude Code

Bybit has disclosed details of a multi-stage macOS malware campaign targeting users searching for “Claude Code,” an AI-powered development tool by Anthropic, according to findings published by its Security Operations Center (SOC) and shared with Finbold on April 21. The company said the campaign represents one of the first publicly documented cases in which a centralized crypto exchange (CEX) has identified and analyzed an active threat exploiting AI tool discovery channels to target developers. According to Bybit, the campaign was first identified in March 2026 and relied on search engine optimization (SEO) poisoning to elevate a malicious domain to the top of Google search results. Users searching for “Claude Code” were redirected to a spoofed installation page designed to closely resemble legitimate documentation. Multi-stage malware chain targets credentials and crypto wallets Bybit’s analysis found that the attack deployed a two-stage malware chain. The initial payload, delivered via a Mach-O dropper, installed an osascript-based infostealer exhibiting characteristics similar to known AMOS and Banshee variants. The infostealer executed a multi-phase obfuscation process to extract sensitive data, including browser credentials, macOS Keychain entries, Telegram sessions, VPN profiles, and cryptocurrency wallet information. Bybit researchers identified targeted access attempts against more than 250 browser-based wallet extensions, as well as multiple desktop wallet applications. A second-stage payload introduced a C++-based backdoor featuring advanced evasion techniques such as sandbox detection and encrypted runtime configuration. The malware established persistence through system-level agents and enabled remote command execution via HTTP-based polling, allowing attackers to maintain ongoing control over compromised devices. The investigation also uncovered social engineering tactics, including fake macOS password prompts used to validate and cache user credentials. In some cases, attackers attempted to replace legitimate wallet applications such as Ledger Live and Trezor Suite with trojanized versions hosted on malicious infrastructure. AI-assisted analysis accelerates detection and response Bybit said its SOC leveraged AI-assisted workflows across the full malware analysis lifecycle, significantly reducing response times while maintaining analytical depth. Initial triage and classification of the Mach-O sample were completed within minutes, with AI models flagging behavioral similarities to known malware families. According to the company, AI-assisted reverse engineering and control-flow analysis reduced deep inspection of the second-stage backdoor from an estimated six to eight hours to under 40 minutes. Automated extraction pipelines identified indicators of compromise, including command-and-control infrastructure, file signatures, and behavioral patterns, which were mapped to established threat frameworks. These capabilities enabled same-day deployment of detection measures. AI-assisted rule generation supported the creation of threat signatures and endpoint detection rules, which were validated by analysts before being pushed to production environments. Bybit said AI-generated reporting drafts reduced turnaround time, allowing threat intelligence outputs to be finalized approximately 70% faster than traditional workflows. “As one of the first crypto exchanges to publicly document this type of malware campaign, we believe sharing these findings is critical to strengthening collective defense across the industry,” said David Zong, Head of Group Risk Control and Security at Bybit. “Our AI-assisted SOC allows us to move from detection to full kill chain visibility within a single operational window. What used to require a team of analysts working across multiple shifts — decompilation, IOC extraction, report drafting, rule writing — was completed in a single session with AI handling the heavy lifting and our analysts providing judgment and validation. Looking to the future, we will face an AI war. Using AI to defend against AI is an inevitable trend. Bybit will further increase its investment in AI for security, achieving minute-level threat detection and automated, intelligent emergency response.” The malware targeted a wide range of environments, including Chromium-based browsers, Firefox variants, Safari data, Apple Notes, and local file directories commonly used to store sensitive financial or authentication information. Bybit said it identified multiple domains and command-and-control endpoints associated with the campaign, all of which have since been defanged for public disclosure. Analysis indicated that attackers relied on intermittent HTTP polling rather than persistent connections, making detection more challenging. According to Bybit, malicious infrastructure associated with the campaign was identified on March 12. Full analysis, mitigation, and internal detection measures were completed within the same day. Public disclosure followed on March 20, accompanied by detailed detection and remediation guidance to help users identify and mitigate similar threats. Featured image via Shutterstock. The post Bybit Security exposes macOS malware campaign targeting users searching for Claude Code appeared first on Finbold .

가장 많이 읽은 뉴스

coinpuro_earn
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.