Alarming macOS Malware Uses Sneaky Tricks to Steal Keychain Passwords

A new malware called NimDoor is making waves in the Apple world. This malware is different from what we usually see on macOS. It targets people who work with Web3 technologies and cryptocurrency, trying to steal their private information and money.

The attackers begin by pretending to be someone the victim knows. They contact the victim through Telegram, a popular messaging app. They then suggest a fake business meeting and send what looks like a normal Zoom invitation. But instead of a real meeting, they trick people into downloading a dangerous file.

This file is disguised as a “Zoom SDK update script,” which sounds official. The download link comes from a fake website that looks very close to Zoom’s real support page. Once the victim downloads and runs this file, the malware silently gets into the system and begins its work.

What makes NimDoor especially dangerous is how deeply it hides inside the computer. It doesn’t behave like most other Mac viruses. Instead of being easy to spot, it uses a secret method called process injection. This allows the malware to sneak into other apps running on the Mac, so it can hide and keep working without being noticed.

Smart Coding and Stealthy Behavior

The malware is built using several programming languages. It uses AppleScript to enter the system, C++ to inject its code into other apps, and a rare language called Nim to run its main features. This combination makes it hard for security tools to understand what the malware is doing.

One clever feature of NimDoor is how it avoids being shut down. Normally, if someone finds a virus, they can force it to stop running. But NimDoor has a secret trick. It listens for system signals that usually tell programs to shut down — like SIGINT and SIGTERM.

To make sure it starts every time the computer is turned on, the malware places a file in the LaunchAgents folder. This is a normal part of macOS that allows apps to open automatically when the computer starts.

What the Malware Tries to Steal

Once NimDoor is running on the victim’s Mac, it begins its main mission — stealing private data. One of the first things it does is try to grab Keychain credentials. Keychain is Apple’s system that stores all your passwords, so if hackers get into it, they can access your emails, bank accounts, and more.

The malware also goes after web browsers. It looks inside popular apps like Google Chrome and Firefox to collect saved passwords and browsing history. It can even spy on Telegram messages to steal sensitive conversations.

All this stolen data is sent back to the hackers using the encrypted channel mentioned earlier. Because of the advanced encryption, even companies that monitor internet traffic might not notice that something bad is happening.

🔐 Brazil’s Banking Backbone Breached: Major Cyberattack Hits C&M Software, Threatens Central Bank Links

This level of technical skill is rare in macOS malware. It shows that the people behind NimDoor spent a lot of time making sure their malware could stay hidden, work efficiently, and avoid being removed. From its fake Zoom invite to its secret updates and encrypted messages, NimDoor is one of the most advanced macOS threats seen in recent years.

Apple users — especially those in crypto and Web3 spaces — are the main targets. The malware is designed to blend in, act like a normal part of the system, and steal valuable information without raising red flags.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Remote jobs exploited in global scheme as Amazon halts 1,800 North Korea-linked applications

Amazon has recently blocked more than 1,800 job applications...

Romania hit by ransomware attack as 1,000 government computers taken offline in water authority breach

Romania’s water management authority has been hit by a...

“Democracy under siege”: Sanders warns Meta and Big Tech are buying U.S. elections to block AI rules

U.S. Senator Bernie Sanders has issued a strong warning...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...

House committee releases photos from Jeffrey Epstein estate with candid and unsettling content

New photos have emerged from the estate of Jeffrey...

Kamala Harris responds to criticism over Biden’s handling of Epstein-related documents

The controversy surrounding documents linked to disgraced sex trafficker...

Julian Assange challenges Nobel Peace Prize award, seeks to block payment to Venezuelan opposition leader

WikiLeaks founder Julian Assange has filed a complaint against...

“This is a huge red flag”: AOC says Trump used force against cartels without sharing intelligence with Congress

The debate in Washington has intensified after strong criticism...

Food Giants Call It “Efficiency” — Workers Call It Tens of Thousands of Layoffs

The food and beverage industry experienced a very difficult...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...

Kamala Harris responds to criticism over Biden’s handling of Epstein-related documents

The controversy surrounding documents linked to disgraced sex trafficker...

Related Articles

Popular Categories

error: Content is protected !!