North Korean hackers target Web3 startups using fake Zoom meeting invitations

來源 Cryptopolitan

North Korean hackers have launched a sophisticated malware campaign targeting Web3 and cryptocurrency companies using NimDoor malware.

SentinelLabs identified advanced attack methods that combine social engineering with complex programming techniques to infiltrate Mac systems and steal sensitive information.

North Korean hackers trick victims through fake Zoom meeting updates

North Korean attackers begin their attacks by posing as known contacts through Telegram messaging, subsequently requesting their victims to organize meetings through Calendly scheduling pages. Victims are invited by email to download what appears to be a legitimate Zoom software update, with spoofed Zoom meeting links embedded.

The attackers build domains that contain malicious files presented as Zoom support update files, with domain names that are designed to resemble actual Zoom meeting URLs. The spoofed domains contain variations such as support.us05web-zoom.forum and support.us05web-zoom.cloud, which are very similar to actual Zoom web domains known to users.

North Korean hackers unleash Nim-based malware on Web3 and crypto networks.
The zoom_sdk_support.scpt is padded with 10k lines of whitespace; note the typo ‘Zook’ and the scroll bar, top right. Source: Sentinel Labs.

The attack programs have thousands of lines of empty space to hide their purpose, making them appear to be bigger and more natural than simple attack programs. Hidden in these programs are just three lines of attack code that download and run other attack modules from servers operated by the hackers.

SentinelLabs researchers discovered multiple concurrent domains used by the same attackers, which pointed to a wide-scale campaign that was impacting numerous victims with customized web addresses for each victim. The typos of the fake update files, like “Zook SDK Update” instead of “Zoom SDK Update,” are more easily detectable and trackable by security researchers.

Once the spoofed update is executed by victims, the malware loads a legitimate Zoom redirect URL with an HTML file. This presents the initial infection as legitimate while covertly initiating the primary attack components in the back. This is for the purpose of misleading victims into believing that they successfully executed a standard software update process.

NimDoor malware steals passwords and personal data

The NimDoor malware campaign uses two separate attack paths once it successfully infects victim computers. The first path focuses on stealing personal information including passwords, browser data, and chat histories from popular applications. The second path establishes long-term access to compromised systems through hidden background programs.

The malware targets multiple web browsers including Google Chrome, Firefox, Microsoft Edge, Brave, and Arc, copying stored passwords, browsing history, and saved login information. It also steals system passwords stored in Mac computers’ built-in password management systems and copies command history files that show what programs users have run.

A specialized component specifically targets Telegram messaging data, stealing encrypted chat databases and decryption keys that allow attackers to read private conversations offline. The stolen Telegram information includes both the encrypted message files and the special keys needed to unlock and read those messages.

All stolen information gets packaged and sent to attacker-controlled servers through encrypted connections. The malware creates hidden folders on infected computers to temporarily store copied data before transmission, using names designed to look like legitimate system files.

The attack uses advanced programming languages including Nim and C++ that many security programs have difficulty detecting. The malware includes features that help it avoid detection by security software, such as communicating through encrypted web connections and using legitimate-looking file names and locations.

The attackers designed the malware to work specifically on Mac computers, taking advantage of built-in Mac features to hide their activities and maintain persistent access to infected systems.

Advanced persistence methods ensure the malware survives

The NimDoor malware includes methods to maintain access to infected computers even after users restart their systems or attempt to remove the malicious software. The attackers use a clever approach that automatically reinstalls the malware whenever users try to terminate or delete it.

When users attempt to stop the malware process or shut down their computers, the malware catches these termination signals and immediately writes backup copies of itself to hidden locations on the infected system. This creates a situation where trying to remove the malware actually triggers its reinstallation process.

The malware creates fake system files with names designed to look legitimate, such as creating folders named after Google services but with subtle spelling differences that users typically do not notice. These fake files get automatic startup permissions that cause the malware to run every time the computer boots up.

A key component acts as a lightweight monitoring program that checks in with attacker servers every 30 seconds, sending information about running programs and waiting for new commands. This monitoring happens through seemingly innocent connections that appear similar to normal web traffic.

The malware also includes a 10-minute delay before becoming fully active, which helps it avoid detection by security software that scans for immediately suspicious behavior. This delay makes the malware appear like a normal program that takes time to start up.

These persistence methods by North Korean hackers make the malware particularly difficult for average users to remove completely. It also often requires specialized security tools or professional assistance to fully clean infected systems.

KEY Difference Wire: the secret tool crypto projects use to get guaranteed media coverage

免責聲明:僅供參考。 過去的表現並不預示未來的結果。
placeholder
日幣2025年上半年漲9%!7月繼續升值?分析師這樣說2025年上半年,美元/日圓(USD/JPY)累計下跌9%,創下近年來最佳表現。
作者  Alison Ho
7 月 01 日 週二
2025年上半年,美元/日圓(USD/JPY)累計下跌9%,創下近年來最佳表現。
placeholder
日元季節性「黃金七月」預期升溫,日元匯率或重返140?TradingKey - 5月中旬以來,美元兌日元匯率徘徊在145左右,2025年前幾個月的日元升值趨勢停滯。隨著美元以半個多世紀以來最快速度貶值以及日本經濟活動趨於活躍,市場押註季節性的7月日元強勢可能會變得明顯。截至撰稿,美元兌日元(USD/JPY)匯率報142.85,日內跌幅約0.80%。本週以來,這一貨幣對下跌1.25%。【美元兌日元匯率(USD/JPY),來源:Investing.com
作者  TradingKey
7 月 02 日 週三
TradingKey - 5月中旬以來,美元兌日元匯率徘徊在145左右,2025年前幾個月的日元升值趨勢停滯。隨著美元以半個多世紀以來最快速度貶值以及日本經濟活動趨於活躍,市場押註季節性的7月日元強勢可能會變得明顯。截至撰稿,美元兌日元(USD/JPY)匯率報142.85,日內跌幅約0.80%。本週以來,這一貨幣對下跌1.25%。【美元兌日元匯率(USD/JPY),來源:Investing.com
placeholder
2025年7月最值得購買的美股ETFTradingKey - 美股市場在經歷4月的深“V”反轉和5月的震盪上漲行情後,儘管6月“美以伊”的衝突爆發,但並未影響美股三大指數加速上漲,標普500指數和納斯達克指數甚至還創了年初以來的新高。 從ETF市場來看,各行業之間在6月出現了較為明顯的分化。其中,代表科技行業的ETF指數(代碼:XLK)在整個6月收穫了接近10%的漲幅,而必需消費主題ETF(代碼:XLP)是唯一一個在6月收跌的ETF
作者  TradingKey
昨日 04: 02
TradingKey - 美股市場在經歷4月的深“V”反轉和5月的震盪上漲行情後,儘管6月“美以伊”的衝突爆發,但並未影響美股三大指數加速上漲,標普500指數和納斯達克指數甚至還創了年初以來的新高。 從ETF市場來看,各行業之間在6月出現了較為明顯的分化。其中,代表科技行業的ETF指數(代碼:XLK)在整個6月收穫了接近10%的漲幅,而必需消費主題ETF(代碼:XLP)是唯一一個在6月收跌的ETF
placeholder
美國非農就業爆表有貓膩?失業率「假摔」,多項指標暗示需求惡化TradingKey - 美國2025年6月非農就業新增人數意外強勁,失業率不升反降,使得市場對於聯準會提前在7月降息的預期幾近消失。然而,不少分析師觀察到,這份表面強勁的非農就業報告,實則處處透露美國就業市場的疲軟跡象。2025年7月3日週四,美國勞工統計局公佈了幾乎超出所有人預期的強勁非農報告:6月非農新增人數14.7萬,預期11萬,拉動三個月平均就業人數增長從5月的14.1萬到15萬;失業率
作者  TradingKey
22 小時前
TradingKey - 美國2025年6月非農就業新增人數意外強勁,失業率不升反降,使得市場對於聯準會提前在7月降息的預期幾近消失。然而,不少分析師觀察到,這份表面強勁的非農就業報告,實則處處透露美國就業市場的疲軟跡象。2025年7月3日週四,美國勞工統計局公佈了幾乎超出所有人預期的強勁非農報告:6月非農新增人數14.7萬,預期11萬,拉動三個月平均就業人數增長從5月的14.1萬到15萬;失業率
placeholder
英鎊大跌後企穩,但財政風險仍存,未來走勢如何?美元走弱提振英鎊,但英國財政風險仍存。英鎊兌歐元或繼續下跌。
作者  Alison Ho
19 小時前
美元走弱提振英鎊,但英國財政風險仍存。英鎊兌歐元或繼續下跌。
goTop
quote