North Korean hackers target Web3 startups using fake Zoom meeting invitations

来源 Cryptopolitan

North Korean hackers have launched a sophisticated malware campaign targeting Web3 and cryptocurrency companies using NimDoor malware.

SentinelLabs identified advanced attack methods that combine social engineering with complex programming techniques to infiltrate Mac systems and steal sensitive information.

North Korean hackers trick victims through fake Zoom meeting updates

North Korean attackers begin their attacks by posing as known contacts through Telegram messaging, subsequently requesting their victims to organize meetings through Calendly scheduling pages. Victims are invited by email to download what appears to be a legitimate Zoom software update, with spoofed Zoom meeting links embedded.

The attackers build domains that contain malicious files presented as Zoom support update files, with domain names that are designed to resemble actual Zoom meeting URLs. The spoofed domains contain variations such as support.us05web-zoom.forum and support.us05web-zoom.cloud, which are very similar to actual Zoom web domains known to users.

North Korean hackers unleash Nim-based malware on Web3 and crypto networks.
The zoom_sdk_support.scpt is padded with 10k lines of whitespace; note the typo ‘Zook’ and the scroll bar, top right. Source: Sentinel Labs.

The attack programs have thousands of lines of empty space to hide their purpose, making them appear to be bigger and more natural than simple attack programs. Hidden in these programs are just three lines of attack code that download and run other attack modules from servers operated by the hackers.

SentinelLabs researchers discovered multiple concurrent domains used by the same attackers, which pointed to a wide-scale campaign that was impacting numerous victims with customized web addresses for each victim. The typos of the fake update files, like “Zook SDK Update” instead of “Zoom SDK Update,” are more easily detectable and trackable by security researchers.

Once the spoofed update is executed by victims, the malware loads a legitimate Zoom redirect URL with an HTML file. This presents the initial infection as legitimate while covertly initiating the primary attack components in the back. This is for the purpose of misleading victims into believing that they successfully executed a standard software update process.

NimDoor malware steals passwords and personal data

The NimDoor malware campaign uses two separate attack paths once it successfully infects victim computers. The first path focuses on stealing personal information including passwords, browser data, and chat histories from popular applications. The second path establishes long-term access to compromised systems through hidden background programs.

The malware targets multiple web browsers including Google Chrome, Firefox, Microsoft Edge, Brave, and Arc, copying stored passwords, browsing history, and saved login information. It also steals system passwords stored in Mac computers’ built-in password management systems and copies command history files that show what programs users have run.

A specialized component specifically targets Telegram messaging data, stealing encrypted chat databases and decryption keys that allow attackers to read private conversations offline. The stolen Telegram information includes both the encrypted message files and the special keys needed to unlock and read those messages.

All stolen information gets packaged and sent to attacker-controlled servers through encrypted connections. The malware creates hidden folders on infected computers to temporarily store copied data before transmission, using names designed to look like legitimate system files.

The attack uses advanced programming languages including Nim and C++ that many security programs have difficulty detecting. The malware includes features that help it avoid detection by security software, such as communicating through encrypted web connections and using legitimate-looking file names and locations.

The attackers designed the malware to work specifically on Mac computers, taking advantage of built-in Mac features to hide their activities and maintain persistent access to infected systems.

Advanced persistence methods ensure the malware survives

The NimDoor malware includes methods to maintain access to infected computers even after users restart their systems or attempt to remove the malicious software. The attackers use a clever approach that automatically reinstalls the malware whenever users try to terminate or delete it.

When users attempt to stop the malware process or shut down their computers, the malware catches these termination signals and immediately writes backup copies of itself to hidden locations on the infected system. This creates a situation where trying to remove the malware actually triggers its reinstallation process.

The malware creates fake system files with names designed to look legitimate, such as creating folders named after Google services but with subtle spelling differences that users typically do not notice. These fake files get automatic startup permissions that cause the malware to run every time the computer boots up.

A key component acts as a lightweight monitoring program that checks in with attacker servers every 30 seconds, sending information about running programs and waiting for new commands. This monitoring happens through seemingly innocent connections that appear similar to normal web traffic.

The malware also includes a 10-minute delay before becoming fully active, which helps it avoid detection by security software that scans for immediately suspicious behavior. This delay makes the malware appear like a normal program that takes time to start up.

These persistence methods by North Korean hackers make the malware particularly difficult for average users to remove completely. It also often requires specialized security tools or professional assistance to fully clean infected systems.

KEY Difference Wire: the secret tool crypto projects use to get guaranteed media coverage

免责声明:仅供参考。 过去的表现并不预示未来的结果。
placeholder
以太坊价格预测:在鲸鱼和ETF购买压力下,ETH在2025年首次实现月度正回报以太坊(ETH)周五交易价格约为2578美元,日内下跌2.6%,但在月度时间框架上上涨约46%——这是2025年首次实现正的月度回报——因为鲸鱼和ETF投资者回归,使这款顶级山寨币重新受到关注。
作者  FXStreet
6 月 02 日 周一
以太坊(ETH)周五交易价格约为2578美元,日内下跌2.6%,但在月度时间框架上上涨约46%——这是2025年首次实现正的月度回报——因为鲸鱼和ETF投资者回归,使这款顶级山寨币重新受到关注。
placeholder
2025年美元年中收官:贬值10%创1970年代以来最差H1,下半年继续跌?TradingKey - 随着特朗普高关税政策的影响从提高通胀演变为美国例外论消退和美国资产大撤离,叠加美联储独立性受到质疑和降息预期升温,2025年上半年美元指数意外暴跌超10%,与华尔街2024年底的美元走势预期相去甚远。美元指数(DXY)今年已连续6个月单月下跌,从年初的110左右一度跌破97。截至6月30日,美元指数报97.09,处于近三年低位,上半年以来下跌约11%。【2025年美元指数
作者  TradingKey
6 月 30 日 周一
TradingKey - 随着特朗普高关税政策的影响从提高通胀演变为美国例外论消退和美国资产大撤离,叠加美联储独立性受到质疑和降息预期升温,2025年上半年美元指数意外暴跌超10%,与华尔街2024年底的美元走势预期相去甚远。美元指数(DXY)今年已连续6个月单月下跌,从年初的110左右一度跌破97。截至6月30日,美元指数报97.09,处于近三年低位,上半年以来下跌约11%。【2025年美元指数
placeholder
逢七必涨!美股会打破“7月上涨魔咒”吗? 7月是美股表现最强的月份之一,标普500平均回报率为3.35%。
作者  Alison Ho
7 月 01 日 周二
7月是美股表现最强的月份之一,标普500平均回报率为3.35%。
placeholder
特朗普“大而美”法案助力黄金上涨!汇丰:2025年下半年金价或承压市场对美国财政状况感到担忧,进而推动黄金价格上涨。7月1日金价一度涨至3358美元/盎司,截至7月2日发稿有所回落,报3334美元/盎司。
作者  Alison Ho
7 月 02 日 周三
市场对美国财政状况感到担忧,进而推动黄金价格上涨。7月1日金价一度涨至3358美元/盎司,截至7月2日发稿有所回落,报3334美元/盎司。
placeholder
美股行业视角下的参议院版减税法案:晶片股利好,光伏股缓忧TradingKey - 美国参议院于7月1日以一票之差通过了特朗普的减税与支出法案,该版本法案拟对晶片制造商增加税收抵免额度且没有囊括此前市场担忧的对风能和太阳能项目的进口组件关税,晶片股和清洁能源股迎来利好。在参议院版本的「大美丽法案」中,若晶片制造商在现有《晶片与科学法案》剔除的2026年截止日期前在美国兴建新工厂,它们将有资格享受35%的投资税抵免,税收抵免比例高于目前的25%和预期的30
作者  TradingKey
7 月 02 日 周三
TradingKey - 美国参议院于7月1日以一票之差通过了特朗普的减税与支出法案,该版本法案拟对晶片制造商增加税收抵免额度且没有囊括此前市场担忧的对风能和太阳能项目的进口组件关税,晶片股和清洁能源股迎来利好。在参议院版本的「大美丽法案」中,若晶片制造商在现有《晶片与科学法案》剔除的2026年截止日期前在美国兴建新工厂,它们将有资格享受35%的投资税抵免,税收抵免比例高于目前的25%和预期的30
goTop
quote