Security researchers at SentinelOne have uncovered a sophisticated attack campaign involving North Korean threat actors—linked to the BlueNoroff/Lazarus APT group—targeting Web3 and cryptocurrency firms. The attackers are using fake Zoom SDK update scripts to trick macOS users into installing a rare Nim‑compiled backdoor dubbed NimDoor 🧠 The Social Engineering Setup Victims are contacted on Telegram by someone posing as a trusted peer and invited to schedule a meeting via Calendly. They then receive an email with a “Zoom meeting” link and instructions to run a Zoom SDK update. The script is heavily obfuscated , padded with thousands of blank lines to disguise its true purpose. 🛠 Infection Chain & Techniques AppleScript Downloader A malicious AppleScript triggers the download of a second-stage payload from a spoofed Zoom domain Dual‑Channel Loaders A C++ loader ( InjectWithDyldArm64 ) uses process injection on macOS to deploy trojan payloads like trojan1_arm64 that...