Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
macOS Malware Uses Fake Google Update for Persistence

macOS Malware Uses Fake Google Update for Persistence

Posted on May 20, 2026 By CWS

macOS users are currently facing a new cybersecurity threat as a variant of the SHub infostealer malware, known as ‘Reaper,’ has emerged. This malware employs a deceptive tactic by using a faux Google Software Update LaunchAgent to establish persistent access on compromised systems. The Reaper malware is particularly insidious due to its ability to disguise itself by mimicking trusted brands, making detection challenging without specialized security tools.

Complex Disguise Tactics

The Reaper malware is notable for its evolving disguises at each stage of its infection process. Victims may initially encounter fake installers for popular apps like WeChat or Miro, which are disseminated via domains that closely resemble those associated with Microsoft. Once the malicious payload is activated, it masquerades as an Apple security update, with its persistence mechanism hidden within directories designed to imitate Google’s software update service. This attack strategy cleverly exploits the reputations of three major tech brands.

Researchers from SentinelOne have conducted a thorough analysis of this Reaper variant. Their findings reveal that the malware is a continuation of the expanding SHub malware family, which has seen significant growth over the past two years. The team highlighted the malware’s use of typo-squatted domains for its operation and its reliance on AppleScript to evade typical detection methods.

Technical Details and Impact

Reaper’s execution bypasses Apple’s Terminal mitigation by leveraging the Script Editor, using dynamically constructed, base64-encoded commands that remain hidden from the visible interface. The malware checks local settings to identify Russian-language input sources, and if detected, it communicates with its command and control server before exiting. Otherwise, it proceeds to execute a second AppleScript in memory, ensuring it leaves no trace on the local disk.

To maintain persistence, Reaper sets up a directory structure mimicking Google’s Keystone update service. It installs a base64-decoded bash script named GoogleUpdate in the ~/Library/Application Support/Google/GoogleUpdate.app/Contents/MacOS/ directory and registers a LaunchAgent with a property list to execute this script every 60 seconds. This mechanism allows continuous system detail uploads to the attacker’s server, providing a persistent remote execution channel.

Data Exfiltration and Security Advice

The Reaper malware includes a FileGrabber routine designed to scan for files with potential business or financial value. It targets specific file types and sizes, including documents, images, and files from cryptocurrency applications. The malware also harvests browser credentials and developer keystrokes while employing methods to thwart security analysis.

SentinelOne advises users to be cautious of scripts from websites that claim a manual security update is necessary, as Apple does not prompt users to run commands in the Script Editor. Users should verify URLs and only download software from official sources. Security defenders are urged to monitor for unexpected AppleScript activity, unusual outbound connections, and new LaunchAgents associated with trusted software vendors.

Indicators of compromise include typo-squatted domains, specific file paths, and API endpoints used by the malware. Users are encouraged to follow the latest updates on cybersecurity threats and implement robust security measures to protect their systems.

Cyber Security News Tags:AppleScript, cyber threat, Cybersecurity, Google update, LaunchAgent, macOS, Malware, Reaper variant, SentinelOne, SHub malware

Post navigation

Previous Post: UAC-0184 Malware Utilizes Bitsadmin and HTA for Stealthy Attacks
Next Post: Vulnerability Exploitation Tops Data Breach Methods in 2025

Related Posts

CrystalX Malware-as-a-Service on Telegram Exposed CrystalX Malware-as-a-Service on Telegram Exposed Cyber Security News
Top 10 Best Digital Footprint Monitoring Tools For Organizations 2025 Top 10 Best Digital Footprint Monitoring Tools For Organizations 2025 Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation Cyber Security News
Fake Trading Platform Spreads Needle Stealer Malware Fake Trading Platform Spreads Needle Stealer Malware Cyber Security News
Seedworm Group Exploits Signed Binaries for Cyber Attacks Seedworm Group Exploits Signed Binaries for Cyber Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Operation Ramz: 53 Servers Seized in Major Cybercrime Bust
  • Enhance Cybersecurity with Strategic Threat Intelligence
  • Vulnerability Exploitation Tops Data Breach Methods in 2025
  • macOS Malware Uses Fake Google Update for Persistence
  • UAC-0184 Malware Utilizes Bitsadmin and HTA for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Operation Ramz: 53 Servers Seized in Major Cybercrime Bust
  • Enhance Cybersecurity with Strategic Threat Intelligence
  • Vulnerability Exploitation Tops Data Breach Methods in 2025
  • macOS Malware Uses Fake Google Update for Persistence
  • UAC-0184 Malware Utilizes Bitsadmin and HTA for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark