North Korean Hackers Deploy NimDoor Malware to Infiltrate Mac Systems in Cryptocurrency Firms

In a recent cybersecurity development, North Korean-affiliated hackers have been identified utilizing a sophisticated malware campaign targeting macOS systems within Web3 and cryptocurrency organizations. This operation, dubbed NimDoor, showcases the evolving tactics of these threat actors as they aim to infiltrate and extract sensitive data from crypto-focused businesses.

Attack Methodology

The initial phase of the attack leverages social engineering techniques. Attackers impersonate trusted contacts on messaging platforms like Telegram, engaging victims in conversations that lead to scheduling fake Zoom meetings via Calendly links. Subsequently, victims receive phishing emails containing malicious Zoom SDK update scripts. These scripts are crafted as AppleScript files, padded with thousands of lines to evade detection, and are designed to fetch additional malware from servers that mimic legitimate Zoom domains.

Upon execution, these scripts download further payloads onto the victim’s machine. Researchers have identified two primary Mach-O binaries—one written in C++ and another in Nim—deployed concurrently to maintain persistent access and facilitate data theft. The use of Nim, a relatively uncommon programming language on macOS, complicates detection efforts and signifies an evolution in the threat actors’ tooling.

Data Exfiltration and Persistence Mechanisms

The malware employs advanced techniques to extract data, including Bash scripts that scrape browser histories, Keychain credentials, and Telegram data. Targeted browsers encompass Arc, Brave, Firefox, Chrome, and Microsoft Edge. Additionally, the malware captures encrypted local Telegram databases, potentially for offline cracking.

To ensure persistence, the malware utilizes macOS LaunchAgents and deceptive naming conventions. For instance, it installs binaries with names like GoogIe LLC, substituting a capital I for a lowercase l to blend in with legitimate files. Another binary, CoreKitAgent, monitors system signals to reinstall itself if terminated, incorporating anti-analysis measures such as asynchronous sleep cycles to evade security sandboxes.

Recommendations for Mitigation

To safeguard against such sophisticated attacks, users are advised to:

– Exercise Caution with Unsolicited Communications: Avoid running scripts or software updates received through unexpected emails or messages, even if they appear to originate from trusted contacts.

– Verify URLs and Sources: Carefully inspect URLs, as attackers often craft lookalike domains to deceive victims.

– Maintain Updated Systems: Keep macOS and all installed applications updated with the latest security patches to reduce vulnerabilities.

– Utilize Reputable Security Tools: Employ endpoint security tools capable of detecting suspicious behaviors like process injection, malicious AppleScripts, or unrecognized launch agents.

– Regularly Review System Configurations: Periodically check login items and LaunchAgents to identify unauthorized entries that may maintain persistence.

– Implement Strong Authentication Measures: Adopt strong, unique passwords and enable multi-factor authentication where available.

By adhering to these practices, individuals and organizations can enhance their defenses against the evolving threats posed by state-sponsored cyber actors targeting the cryptocurrency sector.