Skip to content

North Korean Hackers Strike Web3 Companies through NimDoor Cyberstrike

Uncovered Cyberattack Campaign: North Korean Hackers Launch Strategic Malware Attacks on Web3 and Cryptocurrency Industries

Web3 Companies Under Attack by North Korean Cyber Threat, Using the NimDoor Malware Strain
Web3 Companies Under Attack by North Korean Cyber Threat, Using the NimDoor Malware Strain

North Korean Hackers Strike Web3 Companies through NimDoor Cyberstrike

In a recent development, a new malware campaign, known as NimDoor, has been discovered, posing a significant threat to professionals and organizations operating in the blockchain and digital asset space.

The NimDoor campaign operates by impersonating Zoom updates to deliver malware, using advanced social engineering including AI-powered deepfakes for enhanced deception. The attackers send fake Zoom update links to victims, which contain malicious files disguised as legitimate software upgrades.

Upon execution, the infected program redirects victims to a legitimate Zoom page while deploying malware in the background. The malware is designed to evade detection by appearing as a legitimate Zoom update, exploiting users' trust in official software maintenance processes.

The malware's level of stealth and resilience has raised concerns across the cybersecurity community. It includes a monitoring mechanism that communicates with the hackers' servers every 30 seconds, and upon attempts to shut down the malware or restart the system, the software responds by creating fresh copies of itself in concealed directories.

Once installed, NimDoor malware grants threat actors remote access to the infected macOS systems, enabling credential theft, data exfiltration, and potentially further exploitation within the compromised organization. The malware extracts sensitive data such as login credentials, browsing history, and chat logs from popular web browsers, and also accesses system-level credentials stored in the macOS Keychain and tracks user command histories.

The malware retrieves both encrypted message files and decryption keys from Telegram messaging data, and is configured to launch on startup, ensuring continuous operation. The malicious files download and execute additional malicious components from servers under the attackers' control.

The NimDoor campaign involves multiple domains, each customized for individual targets, suggesting a broad and coordinated attack. The malware is built using programming languages like Nim and C++, posing significant challenges for conventional security software. The collected data is stored in hidden folders under misleading file names and transferred to attacker-controlled servers via encrypted communication channels.

This is especially critical in the Web3 and cryptocurrency sectors where access credentials and private keys can lead to direct financial theft. To avoid falling victim to such attacks, it is crucial for professionals and organizations in these sectors to remain vigilant, verify all software updates, and implement robust security measures.

  1. In the face of this NimDoor malware campaign, it's essential for professionals and organizations in the data-and-cloud-computing sector to strengthen their cybersecurity measures, given the threat's potential for exploiting users' trust in technology.
  2. As the NimDoor malware poses a significant threat to the blockchain and digital asset space, businesses and individuals operating in this field should, therefore, prioritize their data-and-cloud-computing security practices and verify all software updates to ward off such cyber threats.

Read also:

    Latest