Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Beware! North Korean Hackers Target Mac Users in a Very Creative Way

Beware! North Korean Hackers Target Mac Users in a Very Creative Way

CryptopotatoCryptopotato2025/07/02 16:00
By:Author: George Georgiev

New iterations of a well-known scam is now targeting Mac users. Here’s what you need to know.

SentinelLabs, the research and threat intelligence arm of cybersecurity firm SentinelOne, has delved into a new and sophisticated attack campaign called NimDoor, targeting macOS devices from DPRK bad actors.

The elaborate scheme involves using the programming language Nim to inject multiple attack chains on devices used in small Web3 businesses, which is a recent trend.

Self-proclaimed investigator ZachXBT has also uncovered a chain of payments made to Korean IT workers, which could be part of this ingenious group of hackers.

How The Attack is Executed

The detailed report by SentinelLabs describes a novel and obfuscated approach to breaching Mac devices.

It begins in a now-familiar way: by impersonating a trusted contact to schedule a meeting via Calendly, with the target subsequently receiving an email to update the Zoom application. You can find more information on this particular scam trick in our detailed report here .

The update script ends with three lines of malicious code that retrieve and execute a second-stage script from a controlled server to a legitimate Zoom meeting link.

Clicking on the link automatically downloads two Mac binaries, which initiate two independent execution chains: the first scrapes general system information and application-specific data. The second ensures that the attacker will have long-term access to the affected machine.

The attack chain then continues by installing two Bash scripts via a Trojan. One is used to target data from specific browsers: Arc, Brave, Firefox, Chrome, and Edge. The other steals Telegram’s encrypted data and the blob used to decrypt it. The data is then extracted to the controlled server.

What makes this approach unique and challenging for security analysts is the use of multiple malware components and varied techniques employed to inject and spoof malware, making it very difficult to detect.

Similar attacks have also been detected by Huntabil.IT in April and Huntress in June.

Follow The Money

ZachXBT, the pseudonymous blockchain investigator, recently posted on X with his latest findings about substantial payments made to various Democratic People’s Republic of Korea (DPRK) developers working on diverse projects since the beginning of the year.

He has managed to identify eight separate workers working for 12 different companies.

His findings indicate that $2.76 million in USDC was sent out from Circle accounts to addresses associated with the developers per month. These addresses are very close to one that was blacklisted by Tether in 2023, as it’s tied to alleged conspirator Sim Hyon Sop.

Zach continues to monitor similar clusters of addresses, but has not made any information public, as they are still active.

He has issued a warning stating that once these workers take ownership of contracts, the underlying project is at high risk.

“I believe that when a team hires multiple DPRK ITWs (IT workers), it is a decent indicator for determining that the startup will be a failure. Unlike other threats to the industry, these workers have little sophistication, so it’s mainly the result of a team’s own negligence.”

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!

You may also like

Why Trump’s Nvidia-AMD China deal matters far beyond the U.S.

Share link:In this post: Trump’s 15% revenue deal with Nvidia and AMD lets U.S. AI chips flow to China, affecting global semiconductor trade. The agreement keeps American chipmakers in the Chinese market while pressuring rivals like Huawei. China faces a trade-off between security concerns and its need for U.S. chips to advance AI capabilities.

Cryptopolitan2025/08/11 19:15

Kazakhstan busts $16 million crypto mining scheme

Share link:In this post: • Crypto miners use 50 MWh of power intended for other consumers. • Inflicted losses exceed $16 million, Kazakhstan’s financial watchdog estimates. • Kazakhstan is yet to solve problems with electricity shortages caused by mining boom.

Cryptopolitan2025/08/11 19:15

Indonesia targets sovereign AI fund to boost sector amid regional competition

Share link:In this post: Indonesia proposes sovereign AI fund to boost position as regional tech hub. A strategy paper outlines the roadmap for AI growth to 2030, pending public input. However, the plan faces hurdles including skills shortages, low research spend, and patchy internet.

Cryptopolitan2025/08/11 19:15
Indonesia targets sovereign AI fund to boost sector amid regional competition

Rumble eyes $1.17 billion takeover of Northern Data to expand AI and cloud power

Share link:In this post: Rumble may buy Northern Data for €1B, offering 2.319 Rumble shares per Northern Data share. Northern Data will sell its bitcoin mining unit to Elektron Energy for up to $235M, with proceeds going toward repaying a Tether loan. Rumble’s Q2 loss widened to $30.2M despite 12% revenue growth; monthly active users fell to 51M.

Cryptopolitan2025/08/11 19:15
Rumble eyes $1.17 billion takeover of Northern Data to expand AI and cloud power