Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

March 6, 2026

How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

March 6, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    The Core Issue: Consensus Cleanup

    March 6, 2026

    Canada launches new multi-crypto ETF as banks enter the sector

    March 6, 2026

    Bitcoin Price Debate Ignites as Bull Trap Warning Clashes With On-Chain Data

    March 6, 2026

    Bitcoin Primed for Rally Through March if History Repeats, According to Benjamin Cowen – But There’s a Catch

    March 5, 2026

    Top Analyst Reveals What’s Next For Bitcoin, Ethereum and XRP

    March 5, 2026

    Ethereum Price Analysis: Institutional Buying Returns as Whales Accumulate

    March 5, 2026

    Ethereum Hovers at $2,150 — Can ETH Price Rally to $2,400 or Stall Below $2,200?

    March 5, 2026

    Vitalik Buterin Admits Ethereum Hasn’t Meaningfully Improved People’s Lives

    March 5, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    Bitcoin Liquidity Set To Expand With Morgan Stanley BTC ETF Option

    March 6, 2026

    Bitcoin Suppressed By Shadow Banking Rehypothecation: Saylor

    March 5, 2026

    XRP Price Retests Decade-Old Trendline That Previously Triggered 630%+ Rallies

    March 5, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    US Ranks #1 in CoinGecko Global Meme Coin Interest Report

    December 18, 2025

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    Startale App Integrates Kyo Finance to Power Seamless Swaps on Soneium

    March 6, 2026

    ICB Network and Mokoko AI Entail Strategic Partnership to Transform Web3 Gaming Infrastructure

    March 6, 2026

    Atlasbrary and Flux Partner to Boost Scalable Web3

    March 5, 2026

    Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

    March 4, 2026

    DOJ seizures of $580M expose how crypto investment scams scaled into shift work with quotas and scripts

    March 3, 2026

    Aeternum Botnet Shifts Command Control to Polygon Blockchain

    February 27, 2026

    Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

    February 26, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Web 3
    1. Gaming
    2. View All

    METYA Partners With Kult Games to Expand Web3 Gaming Ecosystem

    March 6, 2026

    AurumX Collaborates with FishWar to Redefine Web3-Based Gaming Economies

    March 5, 2026

    C. Thi Nguyen: Prioritizing enjoyment over efficiency in games, the pitfalls of social media scoring systems, and how metrics can obscure true value

    March 4, 2026

    NFTs as Programmable Ownership Layers | Web3 Infrastructure Explained

    March 3, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Reform UK tops donations with millions from Thailand-based crypto investor: Report

    March 6, 2026

    Donald Trump’s crypto legacy in two words: Paul Atkins

    March 6, 2026

    International finance watchdog warns stablecoins are increasingly used in sanctions evasion and money laundering

    March 5, 2026

    XRP and XRPL get a credibility lift from Ripple’s expanding footprint

    March 5, 2026

    XRP rewrites the playbook for altcoin ETF approvals to surge in late 2026 after a wave of futures listings

    March 4, 2026

    Bitcoin ETF custody concentrates power in one place, and now a single operational failure causes dangerous ripples

    March 3, 2026

    Revolut’s stablecoin test targets its 12M UK users

    March 3, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Analysis

    XRP Price Consolidates Under $1.5 — What Could Drive the Next Move to $2?

    March 5, 2026

    Israel’s weekly $3B Iran war cost equals over 41,000 Bitcoin

    March 5, 2026

    Chainlink Price Gains Attention After Visa e-HKD Pilot and LINK Chart Signals Possible Breakout

    March 5, 2026

    Can the Bulls Push the Price to $1.16 as $1 Resistance is Back in Focus

    March 5, 2026

    Bitcoin investors may not need altcoins to diversify if tokenized stocks move on-chain

    March 5, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    What Is Farcaster? The Decentralized Social Media Protocol

    February 10, 2026

    What Is Venice AI? The Privacy-Focused Chatbot

    January 13, 2026

    Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

    March 6, 2026

    The company holding all Bitcoin ETF coins is losing money, resurfacing questions about centralization

    February 21, 2026

    The Bitcoin CME gap will now close forever in May leaving a return to $84k hanging

    February 21, 2026

    Robinhood’s $221 million crypto revenue drop shows crypto winter isn’t on chain and retail already moved

    February 16, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»North Korean Hackers Target Crypto Firms with Novel macOS Malware
North Korean Hackers Target Crypto Firms with Novel macOS Malware
Security and Privacy

North Korean Hackers Target Crypto Firms with Novel macOS Malware

September 8, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

North Korean threat actors are deploying novel techniques to infect crypto businesses with macOS malware designed to steal credentials, according to a new report by SentinelLabs.

The researchers provided an analysis on a series of attacks launched by Democratic People’s Republic of Korea (DPRK) threat actors against Web3 and Crypto organizations during April 2025.

North Korea-affiliated attackers have been attributed to a large volume of major cryptocurrency heists in recent years, as part of efforts to generate revenue for the Pyongyang regime.

In Febrary 2025, the notorious DPRK-linked Lazarus Group stole $1.4bn worth of crypto from the ByBit exchange.

NimDoor Malware Deployed

In the new analysis, SentinelLabs researchers observed the attackers using social engineering techniques typical of DPRK actors to achieve initial access.

After gaining access, the attackers then deployed novel tactics, techniques and procedures (TTPs) to achieve persistence and launch the Nim-based malware, known as NimDoor.

The Nim programming language has become increasingly popular among macOS malware authors, partly due to their unfamiliarity to analysts.

The TTPs used by the attackers include an attack chain consisting of an eclectic mix of scripts and binaries written in AppleScript, C++ and Nim.

This approach makes detection harder for defenders.

“North Korean-aligned threat actors have previously experimented with Go and Rust, similarly combining scripts and compiled binaries into multi-stage attack chains,” the researchers wrote.

“However, Nim’s rather unique ability to execute functions during compile time allows attackers to blend complex behavior into a binary with less obvious control flow, resulting in compiled binaries in which developer code and Nim runtime code are intermingled even at the function level,” SentinelLabs researchers said.

See also  Crunch Time for Liquid as Cryptocurrency Exchange Loses $97m to Hackers

The use of wss for communication and signal interrupts is designed to defeat security measures. wss is the TLS-encrypted version of the WebSocket protocol.

The researchers urged analysts to invest in efforts to understand lesser-known programming languages, such as Nim, and how they can be leveraged to defend against these types of attacks.

The Initial Nim Attack Chain

The blog, published on July 2, observed that the April attacks began with a social engineering technique synonymous with DPRK actors – impersonation of a trusted contact over Telegram and an invitation to schedule a meeting via Calendly.

The target was subsequently sent an email containing a Zoom meeting link and instructions to run a so-called “Zoom SDK update script”.

The domain hosted a malicious AppleScript file, which was heavily padded to obfuscate its true function.

The script ended with three lines of malicious code that that retrieve and execute a second-stage script from a command-and-control (C2) server.

The follow-on script downloaded an HTML file which includes a legitimate Zoom redirect link. Upon execution, this file launches the attack’s core logic.

Multi-Stage Infection Process

The researchers observed a complex multistage deployment process for the NimDoor malware, which encompasses a range of scripts and binaries written in various languages.

This starts with the download of two Mach-O binaries, which set off two independent execution chains.

The first is a C++-compiled universal architecture Mach-O executable, which aims to fetch two Bash scripts used for data exfiltration across different browsers.

The second execution chain starts with an installer binary, which is a universal Mach-O executable compiled from Nim source code. This executable is responsible for achieving long-term access and recovery for the threat actor.

See also  Rug Pull Schemes: Crypto Investor Losses Near $1M

This drops two other binaries onto the victim’s system, called GoogIe LLC and CoreKitAgent.

The misspelling of GoogIe LLC (uppercase I rather than lowercase l), is intended to help the malware blend in and avoid suspicion.

GoogIe sets up a macOS LaunchAgent, which re-launches GoogIe LLC at login and stores authentication keys for later stages.

CoreKitAgent, the most technicaly complex of the binaries analyzed, takes advantage of SIGINT/SIGTERM signal handlers to install persistence when the malware is terminated or the system rebooted.

These are signals users can send to terminate processes. However, when CoreKitAgent catches these signals triggers a reinstallation routine that re-deploys GoogIe LLC.

CoreKitAgent also writes the LaunchAgent for persistence and a copy of itself as the Trojan.

“This behavior ensures that any user-initiated termination of the malware results in the deployment of the core components, making the code resilient to basic defensive actions,” the researchers noted.

Finally, an embedded AppleScript in a stripped version of CoreKitAgent is decoded and launched.

Upon execution, the script beacons to C2 infrastructure every 30 seconds, and attempts to post data obtained from listing all running processes on the victim machine.

Crypto Firms Hackers Korean macOS malware North target
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Reform UK tops donations with millions from Thailand-based crypto investor: Report

March 6, 2026

Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

March 6, 2026

Donald Trump’s crypto legacy in two words: Paul Atkins

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Where is XMR Headed Next?

January 31, 2026

Strategy (MSTR) Reports $2.8B Q3 Income, Bitcoin Gains Soar

October 31, 2025

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

March 6, 2026

How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

March 6, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.