NimDoor: North Korea’s Latest Cyber Exploit Targets Crypto

In April 2025, a wave of cyberattacks targeting Web3 and cryptocurrency businesses revealed a new weapon in the arsenal of North Korean threat actors: NimDoor, a macOS malware compiled in the Nim programming language.

Forensically dissected in this detailed report by researchers at SentinelOne's SentinelLabs, the campaign showcases the Democratic People’s Republic of Korea’s (DPRK) evolving tactics, blending social engineering, novel persistence mechanisms, and cross-platform coding to infiltrate high-value targets.

The use of Nim, a lesser-known computer language, alongside AppleScripts and encrypted WebSocket communications, marks a shift towards more complex and stealthy operations.

Social Engineering: A Familiar Opening

The attack begins with a tried-and-tested DPRK tactic: impersonating a trusted contact via Telegram to lure victims into scheduling a meeting through Calendly. Victims receive an email with a Zoom meeting link and instructions to run a fraudulent “Zoom SDK update script.” This script, hosted on attacker-controlled domains mimicking Zoom’s legitimate infrastructure (e.g., support.us05web-zoom[.]forum), is an AppleScript named *zoom_sdk_support.scpt*. Padded with 10,000 lines of whitespace to evade detection, it contains a typo—“Zook” instead of “Zoom”—revealing the attackers’ carelessness.

The script fetches a second-stage payload from a command-and-control (C2) server, initiating the infection chain.

NimDoor’s Technical Mastery

The campaign’s core innovation lies in its use of Nim-compiled binaries, a rarity in macOS malware. Two primary Mach-O binaries, *a* and *installer*, are dropped into /private/var/tmp. The *a* binary, written in C++, deploys an encrypted payload called *netchk*, which orchestrates data exfiltration. It uses a Password-Based Key Derivation Function 2 (PBKDF2) with the password “gift123$%^” to decrypt two embedded binaries: a benign *Target* binary and the malicious *trojan1_arm64*. The latter is injected into *Target* using a sophisticated process injection technique, enabled by specific macOS entitlements. This injected code communicates with a C2 server via TLS-encrypted WebSocket (wss), a method uncommon in macOS malware, employing multiple layers of RC4 encryption and JSON-formatted messages.

The *installer* binary, also Nim-compiled, sets up persistence by creating a LaunchAgent at ~/Library/LaunchAgents/com.google.update.plist. It deploys two additional Nim binaries: *GoogIe LLC* (with a deceptive capital “I” to mimic Google) and *CoreKitAgent*. These ensure long-term access, with *CoreKitAgent* using a state-driven kqueue mechanism and a novel persistence trick: it intercepts SIGINT and SIGTERM signals (triggered by user or system attempts to terminate the process) to redeploy its components, ensuring resilience against basic defensive measures.

 Data Theft With Precision

NimDoor’s data-stealing capabilities are executed via two Bash scripts, *upl* and *tlgrm*. The *upl* script targets browser data from Arc, Brave, Firefox, Chrome, and Edge, as well as Keychain credentials and shell history files. These are compressed and exfiltrated to a C2 server at dataupload[.]store. The *tlgrm* script focuses on Telegram, stealing its encrypted database and decryption key for potential offline cracking.

Both scripts use near-identical exfiltration functions, indicating a streamlined approach to data theft.

AppleScript As Beacon & Backdoor

A standout feature is the use of AppleScript as a lightweight beacon and backdoor. Embedded in *CoreKitAgent*, an AppleScript at ~/.ses decodes hexadecimal strings to fetch the current timestamp, generate a unique ID, and beacon every 30 seconds to C2 servers (writeup[.]live or safeup[.]store). It lists running processes and executes any commands received, blending seamlessly with macOS’s native scripting environment to avoid detection.

Why Nim?

The choice of Nim, a language known for its compile-time execution and cross-platform compatibility, reflects DPRK actors’ shift towards tools that complicate analysis. Unlike Go or Rust, previously used by North Korean groups, Nim’s ability to interweave developer and runtime code obscures control flow, challenging reverse engineers.

Combined with macOS-specific features like AppleScript and signal handling, NimDoor demonstrates a calculated effort to exploit less-scrutinised technologies.

 A Broader Campaign

SentinelLabs’ findings align with reports from Huntabil.IT and Huntress, which noted similar attack chains targeting Web3 firms. Parallel domains (e.g., support.us06web-zoom[.]online) suggest a broader campaign with tailored URLs for each victim. The infrastructure’s overlap with earlier DPRK operations, such as fake Zoom domains, ties NimDoor to established tactics while showcasing innovation in payload delivery and persistence.

Implications For Defenders

NimDoor’s complexity underscores the need for defenders to adapt to emerging languages and techniques. Its use of wss, process injection, and signal-based persistence highlights active development to bypass security measures.

SentinelLabs urges analysts to study Nim and similar languages, as their obscurity offers attackers an edge.

Indicators of compromise, including domains, file paths, and binary hashes, are provided to aid detection, but the campaign’s sophistication suggests DPRK actors will continue refining their skills, posing ongoing risks to high-value sectors like cryptocurrency.

Image: Ideogram

You Might Also Read: 

North Korean Hackers For Hire:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Securing Cyber-Physical Systems
Qantas Falls Victim As Scattered Spider Targets Aviation »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Dazz

Dazz

Dazz is the cloud security remediation platform for smart security and development teams.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

SecureTeam

SecureTeam

SecureTeam are a UK-based information security practice, specialising in all areas of cybersecurity.

SoConnect

SoConnect

SoConnect provides safe, secured, and taken care of IT, with infrastructure built around you and your business.

Cloud Carib

Cloud Carib

Cloud Carib is the premier provider of managed cloud services in the Caribbean and Latin American regions.

Monokee

Monokee

Monokee offers a solution that seamlessly integrates powerful Identity and Access Management (IAM) capabilities with a low/no code identity orchestrator.