North Korea’s ‘NimDoor’ macOS Malware Targets Web3 and Crypto via Telegram and Zoom Deception

Listen to this Post

Featured Image

Introduction: A New Wave of State-Sponsored Cyber Espionage

As the cryptocurrency and Web3 industries continue to mature, they’re also becoming prime targets for increasingly sophisticated cyberattacks. The latest threat uncovered by cybersecurity researchers reveals a new tactic employed by North Korean threat actors—leveraging fake Zoom meetings and social engineering to spread malware called NimDoor, specifically designed to compromise macOS devices. This campaign, which relies heavily on cross-platform programming and encrypted communication channels, highlights the growing technological prowess of state-backed hacking groups and the unique vulnerabilities in the crypto space.

Original The Rise of ‘NimDoor’ Malware

Cybersecurity experts Phil Stokes and Raffaele Sabato from SentinelOne’s SentinelLABS have identified a new threat targeting macOS users in the Web3 and cryptocurrency sectors. Dubbed NimDoor, this malware is deployed through elaborate social engineering tactics involving Telegram messages and fake Zoom meeting requests.

The attackers, believed to be associated with the North Korean regime (DPRK), impersonate trusted Telegram contacts and send victims invitations to what appear to be legitimate Zoom meetings. To prepare for the call, victims are told to run a “Zoom SDK update script,” which is in fact the initial infection vector. This script—named zoom_sdk_support.scpt—is designed to hide its malicious code by adding excessive whitespace to obscure its final, critical lines. These lines download and execute a second-stage script from a command-and-control (C2) server masquerading as a Zoom support domain.

Once installed, NimDoor performs a variety of malicious functions:

Stealing Telegram user data

Extracting browser and Apple Keychain credentials

Injecting processes

Establishing persistent access using signal handlers triggered during system termination or reboot

The malware uses WebSocket Secure (wss) communication—a rare method in macOS threats—for encrypted remote communication. Notably, this campaign builds upon previous North Korean tactics, such as impersonating video calling platforms (e.g., Microtalk) or staging fake job interviews to install infostealers.

NimDoor’s development in Nim, a lesser-known but cross-platform language, adds a layer of complexity for defenders, making it harder to detect and analyze. SentinelOne urges users in crypto and Web3 sectors to treat unexpected meeting requests—especially those asking to install updates—with extreme caution. They also advise reviewing the published indicators of compromise and ensuring endpoint protection is up to date.

What Undercode Say:

NimDoor isn’t just another malware campaign—it’s a textbook example of how state-sponsored cyber warfare is evolving to match the complexity and decentralization of modern digital ecosystems. This operation shows a notable escalation in three critical dimensions: technical sophistication, psychological manipulation, and platform-specific targeting.

1. Tactical Engineering Through Nim:

Using Nim as the core language behind the malware is a clever move. Not only does it provide the flexibility to craft cross-platform threats, but it also sidesteps many traditional detection methods that are typically optimized for more common languages like C++, Python, or Go. This means security vendors need to adapt their tools to detect threats written in less conventional languages, which slows response times.

2. The Web3 Vector:

Targeting Web3 is strategic. The decentralized nature of this space often means reduced central oversight, making users more vulnerable to social engineering tactics. Moreover, the high value of digital assets stored in wallets and the pseudonymous culture of crypto platforms makes them a goldmine for hackers.

3. Social Engineering at Scale:

The manipulation via Telegram and Calendly is alarmingly effective. It exploits two trusted tools within the startup and crypto worlds. By faking a business meeting scenario—a common, everyday occurrence—the attackers minimize suspicion. What’s chilling is how they weave this narrative seamlessly into a believable context.

4. macOS in the Crosshairs:

Historically, macOS was considered relatively safe from the types of malware that plague Windows. But NimDoor underscores a turning point. As Apple’s user base grows—especially among developers, crypto professionals, and creative sectors—it becomes a more lucrative target. Attackers are clearly adapting their tools to exploit this once-overlooked terrain.

5. The Persistence Layer:

Utilizing SIGINT/SIGTERM signal handlers to enable persistence is an inventive technique. It allows malware to survive even if the user reboots the system or tries to terminate the process. This, coupled with encrypted WebSocket communication, means the threat actor can maintain undetected access for longer periods—making the clean-up significantly harder.

6. Overlapping Campaign Histories:

The similarities between NimDoor and previous North Korean cyber operations reveal a clear pattern. Whether it’s fake video platforms or job interview traps, these actors are refining and iterating their methods. The constant theme is exploiting trust and routine—Zoom calls, social chats, software updates.

7. Implications for Cybersecurity Defense:

The lessons here are crucial. Organizations, especially those in crypto and Web3, must go beyond antivirus and consider behavioral analytics, network segmentation, and zero-trust architectures. Cyber hygiene—like not installing unsolicited scripts—needs to be embedded into company culture.

In short, NimDoor is not just a malware story; it’s a warning. The tools of espionage have now become part of the regular digital experience, seamlessly blending into everyday workflows. Cybersecurity must now account for not just technical vectors, but psychological and cultural ones as well.

🔍 Fact Checker Results:

✅ Nim Programming Language Use Confirmed: Multiple sources, including SentinelOne, validate that Nim was used for cross-platform evasion.

✅ Targeting Crypto/Web3 via Telegram Verified: The phishing vectors align with known DPRK patterns and current threat intelligence.

❌ No Evidence of Widespread Infection Yet: At time of reporting, infections appear targeted rather than broadly distributed.

📊 Prediction:

Given the evolving sophistication of North Korean cyber campaigns and the growing value of digital assets, future variants of NimDoor or similar macOS malware are highly likely to:

Expand beyond Telegram to platforms like Discord or Slack.

Leverage AI-generated personas or voice deepfakes for more realistic deception.
Target broader segments of the Web3 community, including DAOs, NFT marketplaces, and Layer-2 developers.

Enterprises and individuals must expect not just better malware, but smarter, more context-aware social engineering operations that blend into the daily rhythm of work.

References:

Reported By: www.darkreading.com
Extra Source Hub:
https://www.discord.com
Wikipedia
OpenAi & Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

🔐JOIN OUR CYBER WORLD [ CVE News • HackMonitor • UndercodeNews ]

💬 Whatsapp | 💬 Telegram

📢 Follow UndercodeNews & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | 🔗 Linkedin