#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Thursday, July 3, 2025
HomeTopics 1Advanced Persistent ThreatmacOS NimDoor Malware: DPRK Hackers Target Web3 and Crypto Platforms with Nim-Based...

macOS NimDoor Malware: DPRK Hackers Target Web3 and Crypto Platforms with Nim-Based Precision

Date:

Related stories

CVE‑2025‑20309: Cisco Unified CM Exposes Root via Static SSH Credentials

Cisco disclosed a 10.0 CVSS-critical vulnerability (CVE‑2025‑20309) in its...

PDFs: Portable Documents or Perfect Phishing Vectors?

Cybersecurity professionals are sounding the alarm: PDF attachments are...

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...
spot_imgspot_imgspot_imgspot_img

North Korean threat actors have launched a sophisticated macOS malware campaign targeting Web3 and cryptocurrency companies using a rare Nim-based backdoor known as NimDoor. This evolving cyber offensive, discovered in April 2025 and analyzed by SentinelLABS on 2 July 2025, leverages novel persistence techniques, encrypted communications via WebSockets (wss), and process injection tactics rarely seen in macOS-focused threats.

The campaign begins with social engineering tactics: victims receive Telegram messages from impersonated contacts, who then lure them into fake Zoom meetings via Calendly links. Victims are asked to run a fraudulent “Zoom SDK update script,” which is actually an AppleScript named zoom_sdk_support.scpt hosted on spoofed Zoom-like domains (e.g., support.us05web-zoom[.]forum). This script is intentionally padded with 10,000 lines of whitespace to obfuscate malicious content.

Once executed, it downloads a second-stage payload, initiating a multi-stage infection chain:

  • First stage: C++ binary a writes an encrypted payload netchk to disk.
  • Second stage: Nim-based binary installer drops further binaries including GoogIe LLC and CoreKitAgent.

Persistence, Evasion, and Exfiltration on macOS

Unprecedented Use of Signal Handlers

CoreKitAgent-compiled from Nim-introduces a novel persistence technique. It hijacks Unix signal handlers SIGINT and SIGTERM to trigger the reinstallation of malware if the system reboots or the process is terminated.

This malware ecosystem features state machines for execution flow, asynchronous task management, and anti-VM tactics including a 10-minute event-driven delay to evade sandbox detection.

Process Injection and WSS-based C2

The C++ binary a injects the malicious trojan1_arm64 into a benign binary named Target. This code injection—rare on macOS—requires elevated entitlements such as com.apple.security.cs.debugger. Communication with the command-and-control (C2) server occurs over wss://firstfromsep[.]online/client, using triple-layered RC4 encryption and custom JSON payloads.

Data Theft from Browsers, Telegram, and Keychain

Scripts Upl and Tlgrm

Two Bash scripts—upl and tlgrm—are responsible for data exfiltration:

  • upl targets browsers like Chrome, Brave, Edge, and Firefox, as well as macOS Keychain files.
  • tlgrm steals Telegram databases and encryption keys.

Both scripts exfiltrate data to https://dataupload[.]store/uploadfiles using curl.

MEA Impact and Global Implications

Strategic Risks for Web3 and Crypto Firms

Web3 startups in the Middle East and Africa must reevaluate their security postures. The attack highlights how macOS endpoints, often overlooked in corporate networks, are being increasingly exploited.

According to Yusuf Al-Khatib, a regional cybersecurity advisor in Dubai:

“The NimDoor campaign underlines how crypto innovation in MENA is being shadowed by adversarial surveillance. Endpoint hardening must extend beyond Windows.”

With crypto platforms forming part of national economic strategies across Africa and the GCC, attacks like NimDoor may trigger renewed regulatory interest, especially under UAE’s NESA and Saudi Arabia’s ECC regulations.

Global Trend: Malware Authors Flock to Nim

Cross-Platform Languages Are the New Frontier

North Korean groups previously adopted Go and Rust. Now, Nim emerges as a preferred weapon, offering stealth and compile-time function execution. SentinelLABS concludes that Nim’s obscure tooling and unfamiliar structure give attackers a significant edge.

Threat researcher Raffaele Sabato notes:

“NimDoor showcases DPRK’s increasing sophistication on macOS. We’re seeing tactical evolution that outpaces mainstream detection.”

MITRE ATT&CK Mapping & TTPs

- T1566.002 – Phishing: Spearphishing via Service (Telegram)
- T1059.002 – Command and Scripting Interpreter: AppleScript
- T1059.004 – Command and Scripting Interpreter: Bash
- T1055.001 – Process Injection: Dynamic-link Library Injection
- T1071.001 – Application Layer Protocol: WebSockets
- T1556.001 – Modify Authentication Process: Keychain
- T1547.001 – Boot or Logon Autostart Execution: Launch Agent
- T1005 – Data from Local System
- T1027 – Obfuscated Files or Information

Actionable Takeaways for Defenders

  1. Restrict AppleScript execution on macOS endpoints using MDM policies.
  2. Monitor ~/Library/LaunchAgents and /private/tmp for suspicious binary drops.
  3. Detect padding-heavy scripts like zoom_sdk_support.scpt in email attachments.
  4. Inspect firewall logs for outbound wss:// traffic from macOS endpoints.
  5. Block domains like dataupload.store and writeup.live at DNS/firewall level.
  6. Employ behavioral analysis to catch injection attempts like InjectWithDyldArm64.
  7. Train SOC teams on Nim-based malware artifacts.
  8. Incorporate pentesting exercises simulating macOS attacks.
  9. Use YARA rules to hunt for indicators related to CoreKitAgent and GoogIe LLC.
  10. Ensure proper security awareness for employees receiving unusual meeting invites or script updates.

Conclusion

The macOS NimDoor campaign is a stark reminder of DPRK’s agility in exploiting emerging technologies. With macOS systems often under-monitored in enterprise settings, this sophisticated attack reinforces the need for layered defenses, cross-platform detection, and proactive threat hunting. The security community must prepare for more stealthy, Nim-based campaigns as attackers seek new frontiers to evade conventional security tools.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here