#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

40 C
Dubai
Tuesday, August 5, 2025
HomeTopics 1Advanced Persistent ThreatmacOS.ZuRu Resurfaces via Trojanized Termius App Using Modified Khepri C2 Beacon

macOS.ZuRu Resurfaces via Trojanized Termius App Using Modified Khepri C2 Beacon

Date:

Related stories

TikTok Shop Scam “ClickTok” Unleashes SparkKitty Spyware in Global Phishing Blitz

A massive cybersecurity campaign dubbed ClickTok is targeting TikTok Shop users...

CVE‑2025‑7847: Arbitrary File Upload in AI Engine Puts 100K+ WordPress Sites at Risk of RCE

On 18 July 2025, researchers at Wordfence disclosed CVE‑2025‑7847, a high-severity...

Jordan’s Cyber Incidents Soar: NCC Reports 6,758 Attacks in 2024

On 31 July 2025, Jordan’s National Cybersecurity Center (NCC) revealed that...

Russian FSB‑Linked “Secret Blizzard” Launches ISP‑Level AiTM Campaign Against Moscow Embassies

Microsoft Threat Intelligence has uncovered an advanced cyberespionage campaign...
spot_imgspot_imgspot_imgspot_img

On 10 July 2025, cybersecurity researchers uncovered a renewed campaign of the macOS.ZuRu backdoor, this time embedded within a doctored version of the popular SSH client Termius. The malicious app quietly installs a modified Khepri command-and-control (C2) implant, enabling persistent remote access on macOS systems raising fresh concerns for IT teams, particularly in the MEA region where macOS adoption continues to rise.

First flagged in July 2021, macOS.ZuRu trojanized macOS apps by hijacking Baidu’s search results. In January 2024, researchers at Jamf revealed variants embedding the open-source Khepri C2.
In May 2025, a fresh campaign emerged targeting Termius.app, a cross-platform SSH tool popular among developers and administrators .

Technical Analysis: How It Works

Delivery Method

The threat is delivered as a malicious .dmg installer. The authentic Termius application is repackaged (from ~225 MB to ~248 MB) and re-signed to bypass macOS signature validation.

Trojan Components & Persistence

Two extra executables are embedded:

  • A massive 25 MB Mach-O loader (named .localized) injects the Khepri beacon.
  • A renamed helper, .Termius Helper1, ensures legitimate app functions.

Upon launch, .localized fetches a Khepri beacon from download.termius[.]info, drops it into /tmp/.fseventsd, and requests elevated privileges from the user. A LaunchDaemon plist (com.apple.xssooxxagent) is then installed in /Library/LaunchDaemons/ to maintain hourly persistence.

Reverse-Engineered Loader Logic

  • Instance locking via /tmp/apple-local-ipc.sock.lock.
  • Payload integrity check: Modulo-based MD5 hash comparison and download if mismatched.
  • Modified decryption routine: Uses key "my_secret_key" for XOR-based decoding—added obfuscation beyond simple XOR encryption .

Khepri C2 Capabilities

The embedded beacon is a Khepri-based C2 implant (~174 KB Mach-O), requiring macOS Sonoma 14.1+ and capable of reconnaissance, file transfer, remote shell, and command execution (intel.dev.threatlabs.protect.jamfcloud.com).
The beacon communicates with ctl01.termius[.]fun over DNS port 53, masking itself as legitimate traffic via www.baidu.com requests mirroring ZuRu’s previous domain setup.

Regional and Global Implications

MEA Region Risk

macOS is gaining ground in MEA, especially within tech hubs in UAE, Saudi Arabia, and South Africa. As Termius becomes increasingly popular among cloud engineers and pentesters, users in these regions are now at greater risk. The lack of regional malware protection tools exacerbates this threat.

Global Context

This campaign illustrates a shift in macOS malware tactics—trojanizing legitimate tools running on endpoints, compared to previous methods like dynamic library injection. Enterprises operating across continents must reassess their macOS endpoint protection as these threats spread globally.

Expert Quotes

“Attackers target legitimate tools to blend in with developer workflows—making detection far more challenging,” says Jaron Bradley of Jamf Threat Labs (Dark Reading).

SentinelOne reports that its Singularity platform successfully “detects and blocks macOS.ZuRu’s persistence and execution” when protection is enabled (Webasha).

MITRE ATT&CK Mapping

PhaseTechniqueID
Initial AccessExternal Remote Services (Trojanized installer)T1190
PersistenceLaunch DaemonT1543.003
Defense EvasionMasquerading via Domain ImpersonationT1036
Payload DeliveryDownload Remote FileT1105
C2Standard Application Layer Protocol (DNS over port 53)T1071.004
ExecutionCommand ExecutionT1059

Actionable Recommendations

  1. Avoid unofficial macOS tools: install apps from verified sources only
  2. Enforce code-signing policies: block ad-hoc signed bundles at gatekeepers
  3. Deploy XDR/EDR solutions, e.g., SentinelOne, for macOS protection (Webasha)
  4. Monitor LaunchDaemons: alert on unknown plist entries
  5. Block DNS anomalies: use DNS filters to flag suspicious outbound requests
  6. Enable least privilege UAC: reduce risk of elevation via prompts
  7. Run regular endpoint scans: search for .fseventsd, .localized, and suspicious binaries
  8. Harden developer workstations: segregate dev/admin environments
  9. Train staff on threats from malicious installers and ad-hoc signing
  10. Share MITRE mapping and indicators with local CERTs and MEA partners

Conclusion

The return of macOS.ZuRu through a compromised Termius installer marks a worrying evolution in macOS threats-leveraging legitimate developer tools to stealthily implant a powerful Khepri beacon. Regional organizations must ramp up endpoint protections, implement stricter installation policies, and update detection strategies to guard against these emerging macOS security services threats.

References

  • Jamf Threat Labs analysis on poisoned macOS apps (jamf.com)
  • Dark Reading report on Khepri-based macOS malware (Dark Reading)
  • SentinelOne macOS protection and detection data (Poespas Media)
  • GitHub Khepri C2 repository (GitHub)

Enhance your security awareness with more news, updates, alerts, best practices, and trends at CyberCory.
Strengthen your cybersecurity, training, and pentesting capabilities with SaintyNet services.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here