Zoom in on Danger: North Korean Hackers Unleash Sneaky MacOS Malware!
North Korea-linked hackers are spreading macOS NimDoor malware disguised as fake Zoom updates. This stealthy backdoor targets crypto firms by tricking victims through phishing links on Calendly or Telegram. It’s like getting catfished by a malware program—expecting Zoom, but getting Zoom-bombed instead!

Hot Take:
North Korean hackers are bringing their A-game, deploying a malware cocktail with a splash of Nim, a twist of AppleScript, and a whole lot of fake Zoom invites. And just when you thought the only danger in clicking a Zoom link was finding yourself in a meeting you forgot about!
Key Points:
- North Korea-linked hackers are targeting Web3 and crypto firms with NimDoor, a macOS backdoor masquerading as a Zoom update.
- The malware spreads through phishing links sent via Calendly or Telegram, stealing data like browser history and Keychain credentials.
- NimDoor uses encrypted communications, process injection, and mimics AppleScript tools to avoid detection.
- The attack chain involves fake Zoom invites and lookalike domains to deliver malware payloads.
- NimDoor employs complex encryption and WebSocket C2 communications for data exfiltration.
Already a member? Log in here