Security

Sapphire Sleet macOS Intrusion: Key Defender Insights

3 min read

Summary

Microsoft Threat Intelligence detailed a macOS-focused campaign by Sapphire Sleet that uses social engineering and fake software updates instead of exploiting vulnerabilities. The attack chain relies on user-initiated AppleScript and Terminal execution to bypass native macOS protections, making layered defenses, user awareness, and endpoint detection especially important.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft has published new research on a macOS intrusion campaign tied to Sapphire Sleet, a North Korean threat actor known for targeting cryptocurrency and finance organizations. The report matters because it shows how attackers can compromise Macs without using a software exploit—simply by convincing users to run what appears to be a legitimate update.

What’s new in this campaign

Microsoft observed Sapphire Sleet using a fake Zoom SDK Update.scpt file to start a multi-stage infection chain on macOS.

Key techniques highlighted

  • Social engineering over exploits: The campaign depends on users manually opening and running a malicious AppleScript file.
  • Trusted app abuse: The lure opens in macOS Script Editor, a legitimate Apple application, which helps the activity appear benign.
  • Multi-stage payload delivery: The script uses curl and osascript to fetch and run additional AppleScript payloads from attacker-controlled infrastructure.
  • Credential theft and persistence: Later stages harvest passwords, target cryptocurrency assets, manipulate TCC-related behavior, establish persistence, and exfiltrate sensitive data.
  • Decoy update workflow: The malicious script includes fake update instructions and launches trusted system tools to reinforce legitimacy.

Microsoft noted this attack chain can operate outside normal macOS security enforcement boundaries when execution is user-initiated, reducing the effectiveness of controls such as Gatekeeper, notarization checks, quarantine enforcement, and parts of the Transparency, Consent, and Control framework.

Why this matters for defenders

For IT and security teams, the main takeaway is that macOS users remain highly vulnerable to convincing lures, especially in high-value sectors like cryptocurrency, venture capital, finance, and blockchain. The campaign also shows that attackers are increasingly combining legitimate macOS utilities with staged payload delivery to avoid raising suspicion.

Organizations using Microsoft Defender should review Microsoft’s newly published detections, hunting guidance, and indicators of compromise for this activity. Cross-platform visibility is essential, particularly for environments that have historically treated Macs as lower-risk endpoints.

  • Educate users to avoid running unexpected update files, especially .scpt files or scripts delivered outside official channels.
  • Keep macOS up to date with Apple’s latest protections and security updates.
  • Review endpoint detections for suspicious use of Script Editor, osascript, and curl in sequence.
  • Hunt for fake update activity and abnormal AppleScript execution tied to external downloads.
  • Prioritize high-risk users in finance, crypto, and executive roles for stronger monitoring and phishing-resistant controls.

This research is a reminder that modern macOS attacks often succeed through persuasion, not exploitation. Security teams should combine user awareness, endpoint monitoring, and layered defense controls to reduce exposure.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Sapphire SleetmacOS securityMicrosoft Defendersocial engineeringcredential theft

Related Posts

Security

Cryptographic Inventory Strategy for Quantum Readiness

Microsoft is urging organizations to treat cryptographic inventory as the first practical step toward post-quantum readiness. The company outlines a continuous cryptography posture management lifecycle to help security teams discover, assess, prioritize, and remediate cryptographic risks across code, networks, runtime, and storage.

Security

AI Incident Response: What Security Teams Must Change

Microsoft says traditional incident response principles still apply to AI systems, but teams must adapt to non-deterministic behavior, faster harm at scale, and new categories of risk. The company highlights the need for better AI telemetry, cross-functional response plans, and staged remediation to contain issues quickly while longer-term fixes are developed.

Security

Agentic SOC: Microsoft’s Vision for Future SecOps

Microsoft is outlining an "agentic SOC" model that combines autonomous threat disruption with AI agents to accelerate investigations and reduce alert fatigue. The approach aims to shift security operations from reactive incident response to faster, more adaptive defense, giving SOC teams more time for strategic risk reduction and governance.

Security

Storm-2755 Payroll Attacks Hit Canadian Employees

Microsoft has detailed a financially motivated Storm-2755 campaign targeting Canadian employees with payroll diversion attacks. The threat actor used SEO poisoning, malvertising, and adversary-in-the-middle techniques to steal sessions, bypass legacy MFA, and alter direct deposit details, making phishing-resistant MFA and session monitoring critical defenses.

Security

Android SDK Vulnerability Exposed Millions of Wallets

Microsoft disclosed a severe intent redirection flaw in the third-party EngageSDK for Android, putting millions of crypto wallet users at potential risk of data exposure and privilege escalation. The issue was fixed in EngageSDK version 5.2.1, and the case highlights the growing security risk of opaque mobile app supply-chain dependencies.

Security

DNS Hijacking Attacks via SOHO Routers: Microsoft Warns

Microsoft Threat Intelligence says Forest Blizzard has been compromising vulnerable home and small-office routers to hijack DNS traffic and, in some cases, enable adversary-in-the-middle attacks against targeted connections. The campaign matters to IT teams because unmanaged SOHO devices used by remote and hybrid workers can expose cloud access and sensitive data even when corporate environments remain secure.