NimDoor MacOS Malware Abuses Zoom SDK Updates to Steal Keychain Credentials

NimDoor MacOS Malware Abuses Zoom SDK Updates to Steal Keychain Credentials

SentinelOne researchers have discovered NimDoor, a sophisticated MacOS malware campaign ascribed to North Korean-affiliated attackers, most likely the Stardust Chollima gang, in a notable increase in cyber threats targeting the bitcoin industry.

Active since at least April 2025, NimDoor exploits social engineering tactics by masquerading as Zoom SDK updates to infiltrate Web3 and crypto organizations, ultimately aiming to exfiltrate sensitive data such as Keychain credentials, browser histories, and Telegram user information.

Target Web3 and Crypto Organizations

The malware’s name derives from its heavy reliance on Nim-compiled binaries, a rare choice for MacOS threats that leverages the language’s compile-time execution to interleave developer and runtime code, thereby obfuscating static analysis and evading detection.

According to Polyswarm Report, this approach builds on North Korean actors’ prior experiments with languages like Go and Rust, marking an evolution in their offensive capabilities against high-value targets.

The infection chain begins with attackers impersonating trusted contacts via Telegram, luring victims into scheduling Zoom meetings through Calendly.

Victims then receive phishing emails containing a malicious AppleScript disguised as a “Zoom SDK update,” identifiable by a subtle typo (“Zook” instead of “Zoom”) in its comments.

Upon execution, the script deploys two Mach-O binaries: a C++-based component for decrypting and executing payloads focused on data theft, and a Nim-compiled “installer” that plants persistence mechanisms.

These include masquerading as legitimate processes like “GoogIe LLC” (intentionally misspelled) and “CoreKitAgent,” configured via a LaunchAgent plist file to ensure automatic execution on system startup.

Advanced Use of Nim Language

NimDoor’s technical sophistication extends to process injection a technique uncommon on MacOS enabling it to hijack legitimate processes for stealthy operations.

Command-and-control (C2) communications occur over TLS-encrypted WebSocket (wss) channels, with a hex-encoded AppleScript beaconing every 30 seconds to hardcoded C2 servers.

This backdoor functionality allows remote script execution and exfiltration of running process lists, facilitating lateral movement and reconnaissance.

A particularly novel feature is its SIGINT/SIGTERM signal handler, which intercepts termination signals to trigger reinstallation of the malware upon closure or reboot, representing a first-of-its-kind persistence method on MacOS platforms.

Embedded Bash scripts further enhance NimDoor’s data theft capabilities, systematically extracting credentials from the macOS Keychain, browsing data from popular applications including Chrome, Firefox, Brave, Arc, and Edge, as well as Telegram databases containing wallet addresses and session details.

Attackers incorporate distractions, such as scheduling legitimate Zoom calls, to lower victim suspicion during the compromise.

This blend of social engineering and advanced malware engineering underscores Stardust Chollima’s (also known as TA444, APT38, or BlueNoroff) modus operandi.

As a subunit of the Lazarus Group under North Korea’s Reconnaissance General Bureau, the group has been active since 2014, focusing on financial gains through cryptocurrency theft to circumvent sanctions.

Their tactics often involve spear-phishing, deepfakes, and vulnerability exploitation, targeting entities in the US, Europe, and Asia, particularly in South Korea and Japan.

The emergence of NimDoor highlights the growing threat to MacOS ecosystems in the crypto domain, urging organizations to implement robust endpoint detection, scrutinize third-party updates, and monitor for anomalous signal handling or WebSocket traffic.

Analysts recommend vigilance against impersonation on platforms like Telegram and verification of software sources to mitigate such targeted attacks.

Indicators of Compromise (IOCs)

SHA-256 Hash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Stay Updated on Daily Cybersecurity News. Follow us on Google News, LinkedIn, and X.


Source link