Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App

New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App

Posted on July 10, 2025July 10, 2025 By CWS

A classy new variant of the macOS.ZuRu malware has emerged, concentrating on macOS customers by a weaponized model of the favored Termius SSH shopper.

This newest iteration, found in late Might 2025, represents a big evolution within the risk actor’s ways, shifting past their conventional Baidu search engine poisoning campaigns to immediately compromise reputable functions utilized by builders and IT professionals.

The ZuRu malware household first surfaced in July 2021 when a Chinese language blogger recognized trojanized variations of fashionable macOS utilities being distributed by poisoned search outcomes.

Initially concentrating on functions like iTerm2, SecureCRT, and Microsoft Distant Desktop, the malware has persistently centered on instruments generally utilized by backend builders and system directors who require SSH and distant connection capabilities.

SentinelOne researchers recognized this newest variant as a part of their ongoing monitoring of macOS threats, noting important technical enhancements within the malware’s deployment methodology.

The risk actors have deserted their earlier dynamic library injection approach in favor of a extra subtle strategy that embeds malicious elements immediately throughout the goal utility’s helper processes.

The reputable Termius (prime) and the trojan (backside) with two additional binaries (Supply – SentinelOne)

The weaponized Termius utility arrives as a disk picture file measuring 248MB, noticeably bigger than the reputable 225MB model because of the embedded malicious binaries.

The attackers have changed the unique developer signature with their very own advert hoc signature to avoid macOS code signing necessities, demonstrating their understanding of Apple’s safety mechanisms.

This evolution represents a regarding shift towards extra direct utility compromise, probably bypassing conventional detection strategies that target exterior library injection.

The malware’s continued success means that environments missing strong endpoint safety stay weak to those subtle social engineering assaults.

An infection Mechanism and Persistence Techniques

The malware employs a multi-stage an infection course of that begins with the modification of the reputable Termius Helper.app element.

The unique 248KB Termius Helper binary is renamed to .Termius Helper1, whereas a large 25MB malicious substitute takes its place.

Upon execution, this trojanized helper launches each the unique utility to take care of regular performance and the malware loader .localized to provoke the an infection chain.

The malicious LaunchDaemon dropped by macOS.ZuRu (Supply – SentinelOne)

The loader establishes persistence by making a LaunchDaemon with the label com.apple.xssooxxagent, scheduled to execute each hour from /Customers/Shared/com.apple.xssooxxagent.

It downloads an encrypted payload from obtain.termius[.]information/bn.log.enc utilizing the hardcoded decryption key my_secret_key, writing the decrypted Khepri C2 beacon to /tmp/.fseventsd.

The beacon maintains a fast 5-second heartbeat with the command and management server at ctl01.termius[.]enjoyable, utilizing port 53 to mix with reputable DNS site visitors whereas using www.baidu[.]com as a decoy area.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:App, Attacking, macOS, Malware, Termius, Users, Variant, Weaponized, ZuRu

Post navigation

Previous Post: Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension
Next Post: How to Mitigate Risk When Using Social Logins

Related Posts

Windows Notepad Vulnerability Fixed in February Update Windows Notepad Vulnerability Fixed in February Update Cyber Security News
Critical PNG Vulnerabilities Threaten System Security Critical PNG Vulnerabilities Threaten System Security Cyber Security News
Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Cyber Security News
WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks Cyber Security News
Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network Cyber Security News
Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0 Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark