Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials

MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials

Posted on July 16, 2025July 17, 2025 By CWS

A complicated MacOS malware marketing campaign dubbed NimDoor has emerged, focusing on Web3 and cryptocurrency organizations by weaponized Zoom SDK updates.

The malware, attributed to North Korea-linked risk actors doubtless related to Stardust Chollima, represents a big evolution in offensive capabilities in opposition to MacOS methods, having been lively since not less than April 2025.

The assault orchestration begins with elaborate social engineering techniques the place risk actors impersonate trusted contacts on Telegram, inviting victims to schedule Zoom conferences through Calendly.

Victims subsequently obtain malicious emails containing AppleScript disguised as reliable “Zoom SDK updates.”

The malware’s creators inadvertently left identification markers, together with a deliberate typo altering “Zoom” to “Zook” in script feedback, which aids in detection and evaluation.

PolySwarm analysts recognized NimDoor’s distinctive utilization of the Nim programming language, a uncommon selection for MacOS malware that complicates static evaluation by compile-time execution mechanisms.

This strategic language choice interleaves developer and runtime code, creating analytical obscurity that hinders conventional detection methodologies.

Upon execution, NimDoor triggers a multi-stage an infection deploying two distinct Mach-O binaries: a C++ binary chargeable for payload decryption and information theft operations, and a Nim-compiled “installer” that establishes persistence parts.

The malware deploys intentionally misspelled parts together with “GoogIe LLC” and “CoreKitAgent” to evade suspicion whereas sustaining system persistence by LaunchAgent mechanisms.

Superior Persistence and Communication Mechanisms

NimDoor introduces a groundbreaking persistence mechanism using SIGINT/SIGTERM sign handlers, marking the primary documented occasion of such strategies in MacOS malware.

This novel method ensures computerized malware reinstallation upon termination makes an attempt or system reboots, considerably enhancing operational longevity.

The malware establishes command-and-control communications by TLS-encrypted WebSocket protocols, with hex-encoded AppleScript parts beacons transmitting each 30 seconds to hardcoded servers.

These communications exfiltrate working course of lists whereas enabling distant script execution capabilities, successfully making a persistent backdoor into compromised methods.

— Pattern AppleScript construction (Word: “Zook” typo for identification)
— Zoom SDK Replace Script
— Deploys Mach-O binaries for multi-stage an infection

The malware’s information exfiltration capabilities goal important belongings together with Keychain credentials, browser information throughout a number of platforms (Chrome, Firefox, Courageous, Arc, Edge), and Telegram databases containing cryptocurrency pockets data and delicate communications.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Credentials, Keychain, macOS, Malware, NimDoor, SDK, Steal, Update, Weaponizing, Zoom

Post navigation

Previous Post: United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack
Next Post: Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits

Related Posts

Research Finds 64% of Third-Party Apps Access Sensitive Data Research Finds 64% of Third-Party Apps Access Sensitive Data Cyber Security News
AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2 Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data Cyber Security News
New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd Cyber Security News
UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News