According to a report released on July 3rd by the cybersecurity company Sentinel Labs, North Korean hackers are using a new type of malware targeting Apple devices to attack Crypto Assets companies. The hackers impersonate trusted individuals on instant messaging apps like Telegram, sending counterfeit Zoom update files that actually install malware called “NimDoor.”
The malware is written in the rare Nim programming language, capable of bypassing Apple’s memory protection mechanisms and deploying information theft programs specifically targeting Crypto Assets wallets and browser passwords. The Nim language, which can run on Windows, Mac, and Linux without modification, and has a fast compilation speed that is difficult to detect, is becoming the new favorite of cybercriminals.
Malware also includes scripts capable of stealing the Telegram encryption local database and decryption keys, and will wait for 10 minutes before activation to evade security scans.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
North Korean hackers use new Mac malware "NimDoor" to attack crypto assets projects
According to a report released on July 3rd by the cybersecurity company Sentinel Labs, North Korean hackers are using a new type of malware targeting Apple devices to attack Crypto Assets companies. The hackers impersonate trusted individuals on instant messaging apps like Telegram, sending counterfeit Zoom update files that actually install malware called “NimDoor.”
The malware is written in the rare Nim programming language, capable of bypassing Apple’s memory protection mechanisms and deploying information theft programs specifically targeting Crypto Assets wallets and browser passwords. The Nim language, which can run on Windows, Mac, and Linux without modification, and has a fast compilation speed that is difficult to detect, is becoming the new favorite of cybercriminals.
Malware also includes scripts capable of stealing the Telegram encryption local database and decryption keys, and will wait for 10 minutes before activation to evade security scans.