New ZuRu Malware Variant Targets macOS Users Through Trojanized Termius App

A new variant of the long-running macOS.ZuRu malware has been detected trojanizing the widely used cross-platform SSH client Termius, marking a sophisticated evolution in tactics as cybercriminals continue their campaign against macOS users.

The discovery, which surfaced on social media in late May 2025, highlights how threat actors are now leveraging a modified Khepri C2 framework and new infection mechanisms, underlining growing risks for developers and IT professionals operating in macOS environments.

MacOS Threat Actors

Initially observed in July 2021, ZuRu gained notoriety for targeting macOS users via poisoned Baidu search results, distributing trojanized versions of popular backend tools such as iTerm2, SecureCRT, Navicat, and Microsoft’s Remote Desktop for Mac.

The malware authors’ focus on administrative utilities suggested intent to infiltrate environments managed through SSH and other remote protocols.

JAMF researchers noted a major update in early 2024, as pirated apps began harnessing the Khepri open-source C2 framework for advanced post-infection control.

The latest variant arrives in the form of a malicious Termius disk image (.dmg), inflated beyond the legitimate app’s 225MB size by the inclusion of two malicious binaries, raising the trojan’s footprint to 248MB.

Attackers have modified the app bundle’s code signature to bypass macOS’s gatekeeping, embedding additional payloads within a renamed and oversized Termius Helper binary.

Upon execution, this compromised helper launches both a malware loader (.localized) and its own replacement, with the loader immediately fetching a secondary payload (the Khepri C2 beacon) from a remote server and writing it to the local system.

ZuRu Malware
Khepri C2 task list

Shift Infection Vector

A key technical divergence from prior versions lies in the packaging methodology. Rather than injecting malicious dynamic libraries (.dylib) via load commands, this variant embeds executables directly within the helper application, ensuring operational continuity for the user while the attack unfolds covertly in the background.

The loader, .localized, is also responsible for requesting elevated privileges in order to establish persistence via a LaunchDaemon (labeled com.apple.xssooxxagent), which is hard-coded to repeatedly execute itself from the /Users/Shared directory every hour using system-level privileges.

Persistence, lock file management, and update routines are all managed within the loader binary.

Notably, the malware employs a custom decryption mechanism leveraging a hardcoded key string (“my_secret_key”) and a combination of XOR, addition, and subtraction operations, obfuscating the payload against conventional static detection.

A built-in mechanism checks for and updates the main beacon payload by comparing its MD5 hash against a remote value, ensuring attackers can deploy fresh versions as necessary.

Analysis of the altered Khepri beacon uncovered in this campaign reveals a full-featured C2 implant tailored for modern macOS environments, requiring at least macOS Sonoma 14.1 and capable of rapid command execution, file transfer, and system reconnaissance.

The beacon communicates with its C2 infrastructure using DNS port 53, masquerading as legitimate Baidu traffic but ultimately connecting to ctl01.termius[.]fun, an Alibaba Cloud-hosted IP, consistent with domains and infrastructure observed in earlier ZuRu clusters.

Security vendors like SentinelOne have confirmed detection and mitigation capabilities for this new threat. Organizations lacking advanced endpoint protection are advised to urgently review the latest indicators of compromise and harden macOS defenses, as this campaign demonstrates both the persistence and technical acumen of its operators.

Indicators of Compromise (IOCs)

File PathDescription / SHA-1
/Library/LaunchDaemons/com.apple.xssooxxagent.plistPersistence plist
/Users/Shared/com.apple.xssooxxagentMalware loader location
/private/tmp/TermiusTemp directory for malware operations
/tmp/.fseventsdKhepri C2 beacon (SHA-1: a7a9b0f8cc1c89f5c195af74ce3add74733b15c0)
/tmp/apple-local-ipc.sock.lockLock file for malware instance control
Termius Helper (Trojan Mach-O)SHA-1: ace81626924c34dfbcd9a485437cbb604e184426
Termius9.5.0.dmg (Trojan Disk Image)SHA-1: de8aca685871ade8a75e4614ada219025e2d6fd7
.localized (Malware Loader)SHA-1: fa9b89d4eb4d47d34f0f366750d55603813097c1

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here