Alarming macOS Malware Uses Sneaky Tricks to Steal Keychain Passwords

A new malware called NimDoor is making waves in the Apple world. This malware is different from what we usually see on macOS. It targets people who work with Web3 technologies and cryptocurrency, trying to steal their private information and money.

The attackers begin by pretending to be someone the victim knows. They contact the victim through Telegram, a popular messaging app. They then suggest a fake business meeting and send what looks like a normal Zoom invitation. But instead of a real meeting, they trick people into downloading a dangerous file.

This file is disguised as a “Zoom SDK update script,” which sounds official. The download link comes from a fake website that looks very close to Zoom’s real support page. Once the victim downloads and runs this file, the malware silently gets into the system and begins its work.

What makes NimDoor especially dangerous is how deeply it hides inside the computer. It doesn’t behave like most other Mac viruses. Instead of being easy to spot, it uses a secret method called process injection. This allows the malware to sneak into other apps running on the Mac, so it can hide and keep working without being noticed.

Smart Coding and Stealthy Behavior

The malware is built using several programming languages. It uses AppleScript to enter the system, C++ to inject its code into other apps, and a rare language called Nim to run its main features. This combination makes it hard for security tools to understand what the malware is doing.

One clever feature of NimDoor is how it avoids being shut down. Normally, if someone finds a virus, they can force it to stop running. But NimDoor has a secret trick. It listens for system signals that usually tell programs to shut down — like SIGINT and SIGTERM.

To make sure it starts every time the computer is turned on, the malware places a file in the LaunchAgents folder. This is a normal part of macOS that allows apps to open automatically when the computer starts.

What the Malware Tries to Steal

Once NimDoor is running on the victim’s Mac, it begins its main mission — stealing private data. One of the first things it does is try to grab Keychain credentials. Keychain is Apple’s system that stores all your passwords, so if hackers get into it, they can access your emails, bank accounts, and more.

The malware also goes after web browsers. It looks inside popular apps like Google Chrome and Firefox to collect saved passwords and browsing history. It can even spy on Telegram messages to steal sensitive conversations.

All this stolen data is sent back to the hackers using the encrypted channel mentioned earlier. Because of the advanced encryption, even companies that monitor internet traffic might not notice that something bad is happening.

🔐 Brazil’s Banking Backbone Breached: Major Cyberattack Hits C&M Software, Threatens Central Bank Links

This level of technical skill is rare in macOS malware. It shows that the people behind NimDoor spent a lot of time making sure their malware could stay hidden, work efficiently, and avoid being removed. From its fake Zoom invite to its secret updates and encrypted messages, NimDoor is one of the most advanced macOS threats seen in recent years.

Apple users — especially those in crypto and Web3 spaces — are the main targets. The malware is designed to blend in, act like a normal part of the system, and steal valuable information without raising red flags.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

PDF Phishing Hits Hard as Cybercriminals Imitate Big Tech Brands like Microsoft, Adobe and more

Cybercriminals are now using a new and dangerous trick...

🛑 Sanctions Slam Aeza! U.S. and UK Team Up to Shut Down Russia’s Ransomware Powerhouse

The United States has announced tough new sanctions against...

🔍 Double espionage crisis: Iran hacks emails, China targets U.S. troops

The United States is facing new spying threats from...

Cloudflare’s Power Move Against Exploitation: Launches New Tool to Monetize AI Bot Access

Cloudflare, a major internet company, has launched a brand-new...

✈️ Skyjacked: Qantas Confirms Cyberattack Exposing Data of 6 Million Flyers

Qantas, Australia's biggest airline, has confirmed a serious cyberattack...

Sarcoma Ransomware Attack Exposes 1.3TB of Swiss Govt. Files

What Happened in Switzerland? A large cyberattack has hit Switzerland....

🌐 Spy Games in The Hague? ICC Targeted Again as Cyber Intrusions Escalate

The International Criminal Court (ICC), which investigates serious global...

“Gemini AI Is Watching—Even When You Say No”: Google Update Sparks Privacy Panic

In July, 2025, Google rolled out a big change...

Ahold Delhaize Suffers Massive Data Breach Impacting 2.2 Million Customers

What Happened in the Cyberattack? A massive cyberattack has struck...

🔍 Double espionage crisis: Iran hacks emails, China targets U.S. troops

The United States is facing new spying threats from...

Cloudflare’s Power Move Against Exploitation: Launches New Tool to Monetize AI Bot Access

Cloudflare, a major internet company, has launched a brand-new...

✈️ Skyjacked: Qantas Confirms Cyberattack Exposing Data of 6 Million Flyers

Qantas, Australia's biggest airline, has confirmed a serious cyberattack...

Sarcoma Ransomware Attack Exposes 1.3TB of Swiss Govt. Files

What Happened in Switzerland? A large cyberattack has hit Switzerland....

🌐 Spy Games in The Hague? ICC Targeted Again as Cyber Intrusions Escalate

The International Criminal Court (ICC), which investigates serious global...

Related Articles

Popular Categories

error: Content is protected !!