Site icon Cybercory

macOS.ZuRu Resurfaces via Trojanized Termius App Using Modified Khepri C2 Beacon

On 10 July 2025, cybersecurity researchers uncovered a renewed campaign of the macOS.ZuRu backdoor, this time embedded within a doctored version of the popular SSH client Termius. The malicious app quietly installs a modified Khepri command-and-control (C2) implant, enabling persistent remote access on macOS systems raising fresh concerns for IT teams, particularly in the MEA region where macOS adoption continues to rise.

First flagged in July 2021, macOS.ZuRu trojanized macOS apps by hijacking Baidu’s search results. In January 2024, researchers at Jamf revealed variants embedding the open-source Khepri C2.
In May 2025, a fresh campaign emerged targeting Termius.app, a cross-platform SSH tool popular among developers and administrators .

Technical Analysis: How It Works

Delivery Method

The threat is delivered as a malicious .dmg installer. The authentic Termius application is repackaged (from ~225 MB to ~248 MB) and re-signed to bypass macOS signature validation.

Trojan Components & Persistence

Two extra executables are embedded:

Upon launch, .localized fetches a Khepri beacon from download.termius[.]info, drops it into /tmp/.fseventsd, and requests elevated privileges from the user. A LaunchDaemon plist (com.apple.xssooxxagent) is then installed in /Library/LaunchDaemons/ to maintain hourly persistence.

Reverse-Engineered Loader Logic

Khepri C2 Capabilities

The embedded beacon is a Khepri-based C2 implant (~174 KB Mach-O), requiring macOS Sonoma 14.1+ and capable of reconnaissance, file transfer, remote shell, and command execution (intel.dev.threatlabs.protect.jamfcloud.com).
The beacon communicates with ctl01.termius[.]fun over DNS port 53, masking itself as legitimate traffic via www.baidu.com requests mirroring ZuRu’s previous domain setup.

Regional and Global Implications

MEA Region Risk

macOS is gaining ground in MEA, especially within tech hubs in UAE, Saudi Arabia, and South Africa. As Termius becomes increasingly popular among cloud engineers and pentesters, users in these regions are now at greater risk. The lack of regional malware protection tools exacerbates this threat.

Global Context

This campaign illustrates a shift in macOS malware tactics—trojanizing legitimate tools running on endpoints, compared to previous methods like dynamic library injection. Enterprises operating across continents must reassess their macOS endpoint protection as these threats spread globally.

Expert Quotes

“Attackers target legitimate tools to blend in with developer workflows—making detection far more challenging,” says Jaron Bradley of Jamf Threat Labs (Dark Reading).

SentinelOne reports that its Singularity platform successfully “detects and blocks macOS.ZuRu’s persistence and execution” when protection is enabled (Webasha).

MITRE ATT&CK Mapping

PhaseTechniqueID
Initial AccessExternal Remote Services (Trojanized installer)T1190
PersistenceLaunch DaemonT1543.003
Defense EvasionMasquerading via Domain ImpersonationT1036
Payload DeliveryDownload Remote FileT1105
C2Standard Application Layer Protocol (DNS over port 53)T1071.004
ExecutionCommand ExecutionT1059

Actionable Recommendations

  1. Avoid unofficial macOS tools: install apps from verified sources only
  2. Enforce code-signing policies: block ad-hoc signed bundles at gatekeepers
  3. Deploy XDR/EDR solutions, e.g., SentinelOne, for macOS protection (Webasha)
  4. Monitor LaunchDaemons: alert on unknown plist entries
  5. Block DNS anomalies: use DNS filters to flag suspicious outbound requests
  6. Enable least privilege UAC: reduce risk of elevation via prompts
  7. Run regular endpoint scans: search for .fseventsd, .localized, and suspicious binaries
  8. Harden developer workstations: segregate dev/admin environments
  9. Train staff on threats from malicious installers and ad-hoc signing
  10. Share MITRE mapping and indicators with local CERTs and MEA partners

Conclusion

The return of macOS.ZuRu through a compromised Termius installer marks a worrying evolution in macOS threats-leveraging legitimate developer tools to stealthily implant a powerful Khepri beacon. Regional organizations must ramp up endpoint protections, implement stricter installation policies, and update detection strategies to guard against these emerging macOS security services threats.

References

Enhance your security awareness with more news, updates, alerts, best practices, and trends at CyberCory.
Strengthen your cybersecurity, training, and pentesting capabilities with SaintyNet services.

Exit mobile version