A new variant of the ZuRu malware has been identified targeting macOS users, specifically developers, through a trojanized version of the Termius app. This malicious version of Termius, a legitimate business tool, grants attackers full remote access and uses stealthy command-and-control (C2) beacons to evade detection. The malware also features an auto-update mechanism that helps it avoid security measures. Researchers have noted that this variant employs a modified Khepri C2 framework to maintain persistence and conceal its activities within the doctored Termius application.
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App https://t.co/Q24kCoOsc4
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App https://t.co/EIUrMmFcUg
🚨macOS.ZuRu Resurfaces with a New Twist: Trojanized Termius App and Modified Khepri C2 🚨 Our latest research reveals a new variant of macOS.ZuRu, continuing to target macOS users seeking legitimate business tools. This persistent threat leverages a modified Khepri C2 framework https://t.co/z7hQzQlcKP