Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 2025

Dell Declares Data Leak a Hoax

July 22, 2025

Securing the Future: Enterprise AI Lockdown Strategies

July 22, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » DPRK macOS ‘NimDoor’ Malware Targets Web3, Crypto Platforms
Cyber Risk

DPRK macOS ‘NimDoor’ Malware Targets Web3, Crypto Platforms

Staff WriterBy Staff WriterJuly 7, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


A North Korean threat campaign is targeting Web3 and cryptocurrency platforms with a macOS-specific malware tracked as “NimDoor.”

That comes from Phil Stokes and Raffaele Sabato of SentinelOne’s SentinelLABS threat research team, who wrote a blog post on July 2 detailing a macOS-specific threat campaign utilizing binaries compiled with Nim, a cross-platform programming language.

Threat actors tied to the Democratic People’s Republic of Korea (DPRK) used social engineering tactics and the Telegram messaging platform to instruct targets in the Web3 and cryptocurrency spaces to run a fake “Zoom SDK update script” that kicks off the infection chain. The malware ultimately steals Telegram user data, browser data, and Apple Keychain credentials.

Although the campaign is new, others reminiscent of it have been seen before. For example, last summer security researcher Patrick Wardle explained how North Korean threat actors delivered a macOS infostealer by spoofing the video calling service Microtalk. And although not specific to North Korea, Cado Security last August described a macOS infostealer that targets browser credentials and cryptocurrency wallets.

SentinelOne also previously detailed a campaign where DPRK threat actors would get targets to install macOS malware under the pretense of a job interview. That is of course not to be confused with the increased rampancy of North Korean IT worker scams.

Related:Ransomware Attack Triggers Widespread Outage at Ingram Micro

SentinelOne’s research is based in part on previous research published in April by Huntabil.IT and another by Huntress last month.

How NimDoor Works

According to Stokes and Sabato, the attack chain starts with the threat actor posing as one of the target’s trusted Telegram contacts and inviting them to schedule a Calendly meeting. The target is sent a Zoom meeting link with instructions to install a “Zoom SDK update script.”

The script, “zoom_sdk_support.scpt,” is padded with significant whitespace to obfuscate its last three lines — malicious code that retrieves and executes “a second-stage script from a command-and-control server.”

The command-and-control domain also looks looks similar to a Zoom support link. Additionally, Stokes and Sabato said in the blog, “The follow-on script downloads an HTML file named check, which includes a legitimate Zoom redirect link.”

Once threat actors get their hooks in, multiple binaries are installed. Though elements of how the malware works differ depending on instances of the tracked campaign, the broader components of the attack are split into those used for infostealing — namely, browser data, Keychain data, and Telegram user data — and those used for long-term persistence.

Related:Qantas Airlines Breached, Impacting 6M Customers

Defender Takeaways

Stokes and Sabato highlighted multiple unique attributes involving NimDoor, including a persistence mechanism that “takes advantage of SIGINT/SIGTERM signal handlers to install persistence when the malware is terminated or the system rebooted,” as well as “a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol.” The researchers called the latter particularly unusual for macOS malware.

Stokes and Sabato concluded that NimDoor on the whole highlights how threat actors are using cross-platform programming languages in ways “that introduce new levels of complexity for analysts.”

In an email, Stokes tells Dark Reading that defenders should review indicators of compromise included in the blog post and ensure they’re using trusted endpoint protection. Moreover, as is the case with all social engineering campaigns, defenders should be wary of common attack attempts.

“End users and those working in Web3 and Crypto are advised to treat any unsolicited approaches for meetings from contacts via social media, particularly Telegram, with caution,” Stokes says. “Any request to update or download software in order to facilitate such a meeting should be considered a red flag.”

Related:Russian APT ‘Gamaredon’ Hits Ukraine With Fierce Phishing



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAtomic macOS Infostealer: A Backdoor for Ongoing Threats
Next Article Urgent: Patch Now for CitrixBleed 2 NetScaler Vulnerability!
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Oracle Fixes Critical Bug in Cloud Code Editor

July 16, 2025

Military Veterans May Be What Cybersecurity Is Looking For

July 14, 2025

Malicious Open Source Packages Spike 188% YoY

July 8, 2025
Leave A Reply Cancel Reply

Latest Posts

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 20250 Views

Dell Declares Data Leak a Hoax

July 22, 20250 Views

"Reclaiming Control: Fixing Broken Security Operations"

July 22, 20250 Views

Cisco Alert: Active Exploits Targeting ISE Vulnerabilities for Unauthenticated Root Access

July 22, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 2025

Dell Declares Data Leak a Hoax

July 22, 2025

Securing the Future: Enterprise AI Lockdown Strategies

July 22, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202515 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20256 Views

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.