A recent in-depth technical investigation has uncovered a sophisticated campaign by the North Korean state-sponsored threat group TA444 (aka BlueNoroff, Sapphire Sleet, COPERNICIUM, STARDUST CHOLLIMA, or CageyChameleon) targeting the cryptocurrency industry using weaponized meeting links and advanced macOS malware.
The operation demonstrates the evolving tactics, techniques, and procedures (TTPs) of North Korean APTs, with a notable shift towards macOS-specific payloads and social engineering that exploits remote work culture.
Social Engineering via Calendly and Google Meet
Initial access was achieved when a cryptocurrency foundation employee was contacted on Telegram by an external actor, who invited the victim to a Google Meet via a Calendly link.
However, rather than launching a true Google Meet session, the link redirected the user to a malicious spoofed Zoom domain under adversary control.

According to Huntress Report, this domain later delivered a .ics meeting invitation file, masquerading as a legitimate Google Meeting a classic social engineering tactic designed to build trust.
Subsequently, the victim joined a group Zoom session populated by convincing deepfake avatars of the company’s senior leadership.
During the call, the victim was told to download a “Zoom extension” to fix microphone errors.
The provided download link led to an AppleScript file (zoom_sdk_support.scpt), marking the start of a complex, multi-stage malware deployment chain.
Multi-Stage Malware Suite
The initial AppleScript file appeared benign, opening a legitimate Zoom SDK page, but buried beneath thousands of blank lines was obfuscated logic that downloaded and executed a second-stage payload.
Notably, the script checked for and installed Rosetta 2 to guarantee execution of x86_64 binaries on Apple Silicon Macs, demonstrating a high level of technical sophistication.
Analysis revealed a full suite of custom malware implants, including:
- Persistent loader (“Telegram 2”): A Nim-based implant ensuring hourly persistence via macOS LaunchDaemons.
- Modular backdoor (“Root Troy V4” or “remoted”): Written in Go, supporting remote code execution, sleep-aware execution, and payload deployment.
- Process injection loader (“InjectWithDyld”): Facilitates injection of malicious code into system processes by abusing macOS debug entitlements.
- Nim and Swift payloads: Supporting command execution and persistence.
- Keylogger/screen recorder (“XScreen”/keyboardd): Written in Objective-C, supporting keystroke, clipboard, and screencapture exfiltration.
- Cryptocurrency-focused infostealer (“CryptoBot”/airmond): Harvests wallet credentials from browsers/extensions, aggressively targeting crypto assets.
The malware infrastructure maintained encrypted configurations, dynamic payload delivery, and anti-forensics routines, including log and shell history deletion.

Network communications leveraged multiple command and control (C2) domains, many masquerading as legitimate services or leveraging uncommon TLDs (.biz, .online, .xyz).
This campaign highlights a growing trend where macOS is specifically targeted in high-value sectors, debunking the myth of macOS immunity to advanced cyber threats.
The adversaries’ use of process injection, AppleScript, and deepfake-driven social engineering reflects a significant escalation in both technical and psychological operations.
Organizations are urged to increase vigilance against unexpected meeting invitations, requests to install plugins/extensions outside of official app stores, and abrupt platform switches involving suspicious domains.
Proactive endpoint detection and response (EDR), user education, and rigorous verification procedures are vital defenses, especially for sectors handling digital assets.
Indicators of Compromise (IOCs)
| Type | Indicator | Notes |
|---|---|---|
| File | aSHA256: 4cd5df82e1d4…b5cb438c | C++ Dropper |
| File | remotedSHA256: ad01beb19f5b8…37f2d320 | Go Backdoor (Root Troy V4) |
| File | airmondSHA256: ad21af758af2…2e18f42ff | Go Infostealer (CryptoBot) |
| File | keyboarddSHA256: 432c720a9ada…51bb249 | Objective-C Keylogger/Screenrecorder |
| File | zoom_sdk_support.scptSHA256: 1ddef717bf82…6da5ce05 | Initial AppleScript payload |
| File | Telegram 2SHA256: 14e9bb6df490…41fa1527 | Persistent Nim implant |
| File | cloudkitSHA256: 2e30c9e3f032…89392af23d | Process injection candidate |
| Domain | support[.]us05web-zoom[.]biz | Malicious Zoom spoofing/phishing domain |
| Domain | metamask[.]awaitingfor[.]site | C2 for keylogger |
| Domain | productnews[.]online | C2 for CryptoBot |
| Domain | firstfromsep[.]online | C2 for Nim Payload |
| Domain | safefor[.]xyz, readysafe[.]xyz | C2 for Root Troy V4 |
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.