Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Posted on July 10, 2025July 10, 2025 By CWS

Jul 10, 2025Ravie LakshmananEndpoint Safety / Vulnerability
Cybersecurity researchers have found new artifacts related to an Apple macOS malware known as ZuRu, which is thought to propagate by way of trojanized variations of legit software program.
SentinelOne, in a brand new report shared with The Hacker Information, mentioned the malware has been noticed masquerading because the cross‑platform SSH shopper and server‑administration software Termius in late Might 2025.
“ZuRu malware continues to prey on macOS customers searching for legit enterprise instruments, adapting its loader and C2 strategies to backdoor its targets,” researchers Phil Stokes and Dinesh Devadoss mentioned.
ZuRu was first documented in September 2021 by a person on Chinese language question-and-answer web site Zhihu as a part of a malicious marketing campaign that hijacked searches for iTerm2, a legit macOS Terminal app, to direct customers to pretend websites that tricked unsuspecting customers into downloading the malware.

Then in January 2024, Jamf Menace Labs mentioned it found a chunk of malware distributed by way of pirated macOS apps that shared similarities with ZuRu. Among the different in style software program that has been trojanized to ship the malware embrace Microsoft’s Distant Desktop for Mac, together with SecureCRT and Navicat.
The truth that ZuRu primarily depends on sponsored net searches for distribution signifies the risk actors behind the malware are extra opportunistic than focused of their assaults, whereas additionally making certain that solely these on the lookout for distant connections and database administration are compromised.
Just like the samples detailed by Jamf, the newly found ZuRu artifacts make use of a modified model of the open-source post-exploitation toolkit referred to as Khepri to allow attackers to achieve distant management of contaminated hosts.
“The malware is delivered by way of a .dmg disk picture and accommodates a hacked model of the real Termius.app,” the researchers mentioned. “Because the utility bundle contained in the disk picture has been modified, the attackers have changed the developer’s code signature with their very own advert hoc signature with the intention to cross macOS code signing guidelines.”

The altered app packs in two further executables inside Termius Helper.app, a loader named “.localized” that is designed to obtain and launch a Khepri command-and-control (C2) beacon from an exterior server (“obtain.termius[.]information”) and “.Termius Helper1,” which is a renamed model of the particular Termius Helper app.
“Whereas the usage of Khepri was seen in earlier variations of ZuRu, this implies of trojanizing a legit utility varies from the risk actor’s earlier method,” the researchers defined.
“In older variations of ZuRu, the malware authors modified the primary bundle’s executable by including an extra load command referencing an exterior .dylib, with the dynamic library functioning because the loader for the Khepri backdoor and persistence modules.”
In addition to downloading the Khepri beacon, the loader is designed to arrange persistence on the host and checks if the malware is already current at a pre-defined path within the system and employs(“/tmp/.fseventsd”) and in that case, compares the MD5 hash worth of the payload in opposition to the one which’s hosted on the server.
A brand new model is subsequently downloaded if the hash values do not match. It is believed that the function probably serves as an replace mechanism to fetch new variations of the malware as they grow to be out there. However SentinelOne additionally theorized it may very well be a approach to make sure that the payload has not been corrupted or modified after it was dropped.

The modified Khepri software is a feature-packed C2 implant that enables file switch, system reconnaissance, course of execution and management, and command execution with output seize. The C2 server used to speak with the beacon is “ctl01.termius[.]enjoyable.”
“The most recent variant of macOS.ZuRu continues the risk actor’s sample of trojanizing legit macOS functions utilized by builders and IT professionals,” the researchers mentioned.
“The shift in method from Dylib injection to trojanizing an embedded helper utility is probably going an try to avoid sure sorts of detection logic. Even so, the actor’s continued use of sure TTPs – from selection of goal functions and area title patterns to the reuse of file names, persistence and beaconing strategies – counsel these are providing continued success in environments missing enough endpoint safety.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:App, Developers, macOS, Malware, Targeting, Termius, Trojanized, Variant, ZuRu

Post navigation

Previous Post: AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
Next Post: What Security Leaders Need to Know About AI Governance for SaaS

Related Posts

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks The Hacker News
Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms The Hacker News
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News