Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Redefining Productivity: Why AI Should Replace Workflows

February 22, 2026

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Kyndryl Unveils Integrated Cyber Defense Center in Bengaluru

February 22, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » DPRK macOS ‘NimDoor’ Malware Targets Web3, Crypto Platforms
Uncategorized

DPRK macOS ‘NimDoor’ Malware Targets Web3, Crypto Platforms

Staff WriterBy Staff WriterJuly 7, 2025No Comments3 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


A North Korean threat campaign is targeting Web3 and cryptocurrency platforms with a macOS-specific malware tracked as “NimDoor.”

That comes from Phil Stokes and Raffaele Sabato of SentinelOne’s SentinelLABS threat research team, who wrote a blog post on July 2 detailing a macOS-specific threat campaign utilizing binaries compiled with Nim, a cross-platform programming language.

Threat actors tied to the Democratic People’s Republic of Korea (DPRK) used social engineering tactics and the Telegram messaging platform to instruct targets in the Web3 and cryptocurrency spaces to run a fake “Zoom SDK update script” that kicks off the infection chain. The malware ultimately steals Telegram user data, browser data, and Apple Keychain credentials.

Although the campaign is new, others reminiscent of it have been seen before. For example, last summer security researcher Patrick Wardle explained how North Korean threat actors delivered a macOS infostealer by spoofing the video calling service Microtalk. And although not specific to North Korea, Cado Security last August described a macOS infostealer that targets browser credentials and cryptocurrency wallets.

SentinelOne also previously detailed a campaign where DPRK threat actors would get targets to install macOS malware under the pretense of a job interview. That is of course not to be confused with the increased rampancy of North Korean IT worker scams.

Related:Ransomware Attack Triggers Widespread Outage at Ingram Micro

SentinelOne’s research is based in part on previous research published in April by Huntabil.IT and another by Huntress last month.

How NimDoor Works

According to Stokes and Sabato, the attack chain starts with the threat actor posing as one of the target’s trusted Telegram contacts and inviting them to schedule a Calendly meeting. The target is sent a Zoom meeting link with instructions to install a “Zoom SDK update script.”

The script, “zoom_sdk_support.scpt,” is padded with significant whitespace to obfuscate its last three lines — malicious code that retrieves and executes “a second-stage script from a command-and-control server.”

The command-and-control domain also looks looks similar to a Zoom support link. Additionally, Stokes and Sabato said in the blog, “The follow-on script downloads an HTML file named check, which includes a legitimate Zoom redirect link.”

Once threat actors get their hooks in, multiple binaries are installed. Though elements of how the malware works differ depending on instances of the tracked campaign, the broader components of the attack are split into those used for infostealing — namely, browser data, Keychain data, and Telegram user data — and those used for long-term persistence.

Related:Qantas Airlines Breached, Impacting 6M Customers

Defender Takeaways

Stokes and Sabato highlighted multiple unique attributes involving NimDoor, including a persistence mechanism that “takes advantage of SIGINT/SIGTERM signal handlers to install persistence when the malware is terminated or the system rebooted,” as well as “a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol.” The researchers called the latter particularly unusual for macOS malware.

Stokes and Sabato concluded that NimDoor on the whole highlights how threat actors are using cross-platform programming languages in ways “that introduce new levels of complexity for analysts.”

In an email, Stokes tells Dark Reading that defenders should review indicators of compromise included in the blog post and ensure they’re using trusted endpoint protection. Moreover, as is the case with all social engineering campaigns, defenders should be wary of common attack attempts.

“End users and those working in Web3 and Crypto are advised to treat any unsolicited approaches for meetings from contacts via social media, particularly Telegram, with caution,” Stokes says. “Any request to update or download software in order to facilitate such a meeting should be considered a red flag.”

Related:Russian APT ‘Gamaredon’ Hits Ukraine With Fierce Phishing



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAtomic macOS Infostealer: A Backdoor for Ongoing Threats
Next Article Urgent: Patch Now for CitrixBleed 2 NetScaler Vulnerability!
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

September 19, 2025

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025
Leave A Reply Cancel Reply

Latest Posts

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable

February 22, 2026

Hackers Exploit Multiple AI Services to Breach Over 600 FortiGate Devices

February 21, 2026

Identity Gaps Fuel 90% of Major Cyber Incidents Amid AI-Driven Attacks

February 20, 2026
Don't Miss

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

By Staff WriterSeptember 19, 2025

Essential Insights Launch of RiskRubric.ai: The Cloud Security Alliance and partners have introduced RiskRubric.ai, the…

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Redefining Productivity: Why AI Should Replace Workflows
  • Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware
  • Kyndryl Unveils Integrated Cyber Defense Center in Bengaluru
  • Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable
  • Hackers Exploit Multiple AI Services to Breach Over 600 FortiGate Devices
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Redefining Productivity: Why AI Should Replace Workflows

February 22, 2026

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Kyndryl Unveils Integrated Cyber Defense Center in Bengaluru

February 22, 2026
Most Popular

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

July 8, 202510 Views

The CTEM Conversation We All Need

June 30, 202510 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.