North Korean Hackers Deploy macOS Malware to Target Crypto Firms

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 16, 2025 3 min read

North Korean Malware Campaign Targeting Crypto Firms

North Korean hackers are executing a sophisticated campaign leveraging malware designed to infiltrate Web3 and cryptocurrency organizations. This campaign utilizes a variety of techniques, including social engineering, deceptive AppleScripts, and binaries compiled in the niche programming language Nim. The operation is referred to as "NimDoor" by researchers at Sentinel Labs.

Hacker in a dark hoody sitting in front of a notebook with digital north korean flag and binary streams background cybersecurity concept

Image courtesy of CSO Online

Attack Vector and Initial Compromise

The initial phase of the attack often begins with social engineering tactics. Victims receive messages on Telegram from contacts they believe to be trustworthy, requesting to schedule meetings via Calendly. Following this, they receive phishing emails containing fake Zoom meeting invitations and instructions to run a bogus "Zoom SDK update" script. The script, named zoom_sdk_support.scpt, is padded with 10,000 lines of white space to obfuscate its malicious intent while it executes a secondary payload from a remote server.

Researchers at Huntress have documented these attacks, noting that the malware is capable of maintaining persistence on compromised systems through clever techniques involving macOS LaunchAgents. This allows the malware to reinstate itself even after termination or a system reboot.

Multi-Stage Infection Process

Once the initial script is executed, it downloads two Mach-O binaries. The first, written in C++, writes an encrypted payload to disk, while the second, compiled from Nim source code, is responsible for maintaining access. This malware employs process injection techniques, a rarity in macOS malware, and communicates over TLS-encrypted WebSockets (wss) to exfiltrate sensitive information.

Authy hack | Low-key photo of MacBook keyboard

Image courtesy of 9to5Mac

Data Exfiltration Techniques

The malware utilizes Bash scripts to scrape and exfiltrate sensitive user data, including Keychain credentials and browser information from popular browsers like Chrome, Firefox, and Brave. The malware's persistence is cleverly disguised using names that resemble legitimate system files, making detection difficult.

In addition to data scraping, the malware employs a unique persistence mechanism that leverages signal handlers for SIGINT and SIGTERM, ensuring it remains active even when attempts are made to terminate its processes. This technique represents an evolution in North Korean cyber operations, illustrating their shift towards utilizing less common programming languages, such as Nim, for malicious purposes.

Conclusion

The NimDoor malware campaign exemplifies the evolving threat landscape posed by North Korean APT groups. Users are advised to remain vigilant and avoid executing scripts or software updates from unexpected sources. Keeping macOS systems updated with the latest security patches and utilizing reputable endpoint security tools can help mitigate the risks posed by these sophisticated attacks.

For more detailed technical insights, refer to the full reports from Sentinel Labs and Huntress.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article
Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats
Ipidea proxy network

Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

Google has disrupted Ipidea, a massive residential proxy network used by cybercriminals. Learn how this action impacts online security and what it means for threat actors. Read now!

By Brandon Woo February 27, 2026 4 min read
common.read_full_article