NimDoor Malware Hits macOS Crypto Startups
North Korean hackers deploy NimDoor malware via fake Zoom updates to steal crypto wallets on macOS.

- NimDoor malware disguises as Zoom updates to infect macOS devices.
- Targets crypto firms by stealing wallets, passwords, and Telegram data.
- Uses rare Nim language and AppleScript for stealth and persistence.
North Korean hackers have launched a new campaign using NimDoor malware to target macOS-based crypto firms. The malware is cleverly disguised as a Zoom SDK update and spreads through Telegram messages and email invites. Victims receive a fake Calendly link that downloads an AppleScript file padded with thousands of blank lines to hide its code. When executed, the script installs NimDoor onto the device.
How NimDoor Stays Hidden
What makes this malware particularly dangerous is its stealth. It’s written in Nim, a rarely used programming language that helps the code evade traditional security analysis. Once installed, NimDoor injects itself into other processes, uses encrypted WebSocket channels for communication, and resists deletion by reinstalling itself if terminated. It also includes a beaconing system via AppleScript, pinging command servers every 30 seconds.
What NimDoor Steals
The main goal of NimDoor is to steal sensitive data from crypto companies. It collects:
- Browser passwords from Chrome, Brave, Firefox, and more.
- macOS Keychain contents including saved credentials.
- Local Telegram databases and encryption keys.
- Terminal command history and system information.
This gives attackers the ability to compromise crypto wallets, hijack Telegram accounts, and steal business-critical data—all while staying under the radar.
Protecting Against This Threat
Crypto firms and individual users should avoid downloading updates from unofficial links or direct messages. Always use trusted sources for software updates. Additionally, regularly monitor system login items and be cautious of any suspiciously named applications or scripts. Endpoint protection tools should be configured to detect unusual process injections and AppleScript activity.
Read Also :
- Bitcoin Price Surge on Binance Tops $110K
- Ethereum ICO Whale Moves $2.6M to Kraken Exchange
- Hamak Limited Adds Bitcoin to Treasury Reserves
- Bitcoin Long-Term Holders Hit Record 14.7M BTC
- Global First: Swiss‑Regulated Amina Bank Backs Ripple RLUSD