A new wave of cyberattacks believed to originate from North Korea is now targeting macOS users working in the cryptocurrency and Web3 sectors, cybersecurity firm Sentinel Labs has revealed. The malware, dubbed โNimDoor,โ utilizes an uncommon programming language and employs social engineering tactics to infiltrate Apple systems through fake Zoom updates and phishing links.
Researchers report that the attackers initiate contact via Telegram, posing as reputable contacts to earn the trust of potential victims. These individualsโoften employees at blockchain or crypto firmsโare invited to phony Zoom calls, where they are instructed to download what appears to be a legitimate Zoom SDK update.
Behind the scenes, this update script executes a chain of malicious processes:
-
AppleScript-based beacons to maintain surveillance,
-
Bash scripts for credential extraction,
-
Nim and C++-compiled binaries that enable remote control and persistence.
One such binary, known as CoreKitAgent, employs a signal-based mechanism that keeps it active even after reboots, making it incredibly difficult to eliminate.
Digital Wallets in the Crosshairs
This campaign appears to specifically target crypto-related data, with a focus on stealing:
-
Browser-stored credentials,
-
Digital wallet information,
-
Keychain and encrypted files from Appleโs password manager,
-
And even Telegramโs local database, which could include private keys and seed phrases.
The malware is designed to extract data from major browsers like Chrome, Brave, Edge, and Firefox, all while remaining undetected by traditional antivirus tools.
A New Tactic in North Koreaโs Cyber Arsenal
Sentinel Labs has confidently linked the attack to North Korea-aligned threat actors, continuing a longstanding strategy of funding state activities through crypto theft. This particular operation marks a notable shift: previous North Korean campaigns used Go or Rust, but NimDoor represents one of the first high-profile uses of the Nim language in macOS-based attacks.
Notorious groups like Lazarus have repeatedly targeted the crypto sector, with past efforts including Python-based malware like Kandykorn, which was distributed on Discord servers disguised as crypto bots.
macOS Security Assumptions No Longer Hold
Cybersecurity experts now warn that the traditional belief in macOSโs superior malware resistance is outdated. With threat actors adopting obscure languages and complex persistence mechanisms, users and developers alike must rethink their approach to digital security.
Sentinel Labs also referenced recent malware strains such as:
-
SparkKitty, which stole seed phrases from iOS photo galleries,
-
And a trojanized wallet app that silently replaced legitimate wallet software on Mac systems.
Stay Alert: What You Should Know
-
Be cautious of unsolicited Zoom invitations or software updates, even from known contacts.
-
Never download SDKs or tools from unverified sources.
-
Use multi-factor authentication and encrypted password managers.
-
Monitor system behavior for unusual activity, especially after updates or app installations.
As North Koreaโs cyber strategies grow more advanced, crypto professionals must remain vigilantโnot only about the assets they manage but the platforms they use.