Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
UAC-0184 Malware Chain Uses bitsadmin and HTA Files for Gated
May 19, 2026
macOS Malware Uses Fake Google Update for Persistence
May 19, 2026
Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi
May 19, 2026
Home/Threats/macOS Malware Uses Fake Google Update for Persistence
Threats

macOS Malware Uses Fake Google Update for Persistence

A new and sophisticated threat has emerged for macOS users: a variant of the SHub infostealer malware, dubbed “ HTML source code showing the construction of the malicious AppleScript (Source –...

David kimber
David kimber
May 19, 2026 3 Min Read
2 0

A new and sophisticated threat has emerged for macOS users: a variant of the SHub infostealer malware, dubbed “

HTML source code showing the construction of the malicious AppleScript (Source - SentinelOne)
HTML source code showing the construction of the malicious AppleScript (Source – SentinelOne)

SentinelOne said in a report shared with Cyber Security News (CSN) that the malware “uses fake WeChat and Miro installers as lures” and that the infection chain shifts its disguise at each stage. The team confirmed the campaign is hosted on a typo-squatted Microsoft domain and uses AppleScript to bypass standard detection methods.

Once a user is tricked into running the fake installer, the malware uses AppleScript to deliver the initial shell script rather than relying on standard ClickFix social engineering.

Fake Google Software Update

This variant bypasses Apple’s Terminal mitigation entirely by routing execution through Script Editor. The malicious command is constructed dynamically and padded with base64-encoded strings, keeping it hidden below the visible portion of the Script Editor window.

Reaper checks the victim’s local settings by querying the com.apple.HIToolbox.plist file to detect Russian-language input sources.

If the host appears to be in a Commonwealth of Independent States region, the malware sends a cis_blocked event to its command and control server and exits.

The AppleScript Filegrabber handler is similar to that used by AMOS Atomic and other macOS infostealers (Source - SentinelOne)
The AppleScript Filegrabber handler is similar to that used by AMOS Atomic and other macOS infostealers (Source – SentinelOne)

Otherwise, it retrieves a second AppleScript containing the core extraction logic and runs it in memory via osascript, never directly touching the local disk.

Before finishing its initial run, Reaper establishes persistence using a directory structure built to mimic Google’s legitimate Keystone update service.

It places a base64-decoded bash script named GoogleUpdate inside ~/Library/Application Support/Google/GoogleUpdate.app/Contents/MacOS/, then registers a LaunchAgent using a property list named com.google.keystone.agent.plist. This causes the script to execute silently every 60 seconds in the background.

Every time the LaunchAgent fires, the script sends system details to the attacker’s /api/bot/heartbeat endpoint.

If the server returns a “code” payload, the script decodes it, writes it to /tmp/.c.sh, runs it with the current user’s privileges, and then deletes it. This gives the attacker a persistent and trace-free remote execution channel on the compromised machine.

Data Theft and Anti-Analysis Measures

Reaper includes a FileGrabber routine that scans the Desktop and Documents folders for files likely to hold business or financial value.

It targets extensions such as .docx, .wallet, .key, .json, and .rdp, along with images under 1MB and documents under 5MB, capping total collection at 100MB.

Files are staged in /tmp/shub_random/ before being split into 10MB chunks and uploaded to the attacker’s server via curl.

The malware also targets cryptocurrency desktop applications including Exodus, Atomic, Ledger Live, and Trezor Suite, while harvesting browser credentials and developer keystrokes.

It overrides console functions and runs a continuous debugger loop to obstruct security analysis. If a researcher opens DevTools, the page replaces its content with a Russian-language access denied message.

SentinelOne advises users to avoid executing scripts from websites claiming a manual security update is required, as Apple never prompts users to open Script Editor and run commands.

Users should verify URLs carefully and only download software from official developer sites or the Mac App Store.

Defenders should watch for unexpected AppleScript activity, unusual outbound connections after Script Editor runs, and new LaunchAgents in namespaces tied to trusted software vendors.

Indicators of Compromise (IoCs):-

Type Indicator Description
Domain mlcrosoft[.]co[.]com Typo-squatted Microsoft domain used for initial payload delivery 
Domain hebsbsbzjsjshduxbs[.]xyz C2 server endpoint used for file chunk uploads via /gate/chunk 
File Path ~/Library/Application Support/Google/GoogleUpdate.app/Contents/MacOS/GoogleUpdate Fake Google Software Update persistence script 
File Path ~/Library/LaunchAgents/com.google.keystone.agent.plist Malicious LaunchAgent plist mimicking Google Keystone service 
File Path /tmp/.c.sh Temporary shell script written and executed by the backdoor, then deleted 
File Path /tmp/shub_<random>/ Staging directory for collected files before exfiltration 
File Path /tmp/shub_split.sh Bash script used to split the collected archive into 10MB chunks 
API Endpoint /api/bot/heartbeat C2 heartbeat endpoint receiving system telemetry every 60 seconds 
Build Hash d5441713c48ddc b023/62f133bdb36134038278dc48f06224/2531fedbb2bd2 Build identifier associated with the Reaper variant 
Build Name ReperHardcoded Internal build name embedded in the malware binary 
Hash Hashc806fcf7203117751460f7/c8e3760e File hash associated with the Reaper build 

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi

Next Post

UAC-0184 Malware Chain Uses bitsadmin and HTA Files for Gated

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DirtyDecrypt Linux Kernel PoC Exploit Code Vulnerability Released
May 19, 2026
Malware Campaign Delivers Crypto Clipper via JS, PS
May 19, 2026
Operation Ramz Seizes 53 Servers: Cyber Linked Scams
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us