Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials

Posted on July 16, 2025July 17, 2025 By CWS

A complicated MacOS malware marketing campaign dubbed NimDoor has emerged, focusing on Web3 and cryptocurrency organizations by weaponized Zoom SDK updates.

The malware, attributed to North Korea-linked risk actors doubtless related to Stardust Chollima, represents a big evolution in offensive capabilities in opposition to MacOS methods, having been lively since not less than April 2025.

The assault orchestration begins with elaborate social engineering techniques the place risk actors impersonate trusted contacts on Telegram, inviting victims to schedule Zoom conferences through Calendly.

Victims subsequently obtain malicious emails containing AppleScript disguised as reliable “Zoom SDK updates.”

The malware’s creators inadvertently left identification markers, together with a deliberate typo altering “Zoom” to “Zook” in script feedback, which aids in detection and evaluation.

PolySwarm analysts recognized NimDoor’s distinctive utilization of the Nim programming language, a uncommon selection for MacOS malware that complicates static evaluation by compile-time execution mechanisms.

This strategic language choice interleaves developer and runtime code, creating analytical obscurity that hinders conventional detection methodologies.

Upon execution, NimDoor triggers a multi-stage an infection deploying two distinct Mach-O binaries: a C++ binary chargeable for payload decryption and information theft operations, and a Nim-compiled “installer” that establishes persistence parts.

The malware deploys intentionally misspelled parts together with “GoogIe LLC” and “CoreKitAgent” to evade suspicion whereas sustaining system persistence by LaunchAgent mechanisms.

Superior Persistence and Communication Mechanisms

NimDoor introduces a groundbreaking persistence mechanism using SIGINT/SIGTERM sign handlers, marking the primary documented occasion of such strategies in MacOS malware.

This novel method ensures computerized malware reinstallation upon termination makes an attempt or system reboots, considerably enhancing operational longevity.

The malware establishes command-and-control communications by TLS-encrypted WebSocket protocols, with hex-encoded AppleScript parts beacons transmitting each 30 seconds to hardcoded servers.

These communications exfiltrate working course of lists whereas enabling distant script execution capabilities, successfully making a persistent backdoor into compromised methods.

— Pattern AppleScript construction (Word: “Zook” typo for identification)
— Zoom SDK Replace Script
— Deploys Mach-O binaries for multi-stage an infection

The malware’s information exfiltration capabilities goal important belongings together with Keychain credentials, browser information throughout a number of platforms (Chrome, Firefox, Courageous, Arc, Edge), and Telegram databases containing cryptocurrency pockets data and delicate communications.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Credentials, Keychain, macOS, Malware, NimDoor, SDK, Steal, Update, Weaponizing, Zoom

Post navigation

Previous Post: United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack
Next Post: Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Related Posts

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots Cyber Security News
GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows Cyber Security News
2,000+ Devices Hacked Using Weaponized Social Security Statement Themes Cyber Security News
Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
  • Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards
  • SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
  • Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards
  • SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News