SHub Reaper macOS malware hides persistence as a fake Google Software Update


A new SHub macOS infostealer variant called Reaper is using fake WeChat and Miro installers, AppleScript execution, and a fake Google Software Update LaunchAgent to steal data and maintain access on infected Macs.

SentinelOne researchers say the campaign abuses trusted branding at several stages. The lure may look like a popular app installer, the payload pretends to be an Apple security update, and persistence hides inside a folder that imitates Google’s software update system.

The malware targets browser data, macOS credentials, cryptocurrency wallets, Telegram sessions, business files, and other sensitive information. It also installs a backdoor that can run attacker-supplied commands every 60 seconds.

How the SHub Reaper infection starts

The attack begins when users visit fake installer pages for apps such as WeChat or Miro. Some of these pages use typo-squatted domains designed to look like trusted infrastructure, including a Microsoft-themed domain.

Instead of relying on the older ClickFix method that tricks users into pasting commands into Terminal, Reaper uses the applescript:// URL scheme to open macOS Script Editor with a malicious script already loaded.

The malicious AppleScript is padded with fake installer text and visual filler, pushing the real command below the visible part of the Script Editor window. If the user clicks Run, the script displays a fake Apple XProtectRemediator update message while fetching the next payload in the background.

StageDisguisePurpose
Initial lureFake WeChat or Miro installerTricks users into starting the infection
DeliveryTypo-squatted Microsoft-themed domainMakes the source look more trustworthy
ExecutionFake Apple security update messageEncourages users to run the AppleScript
PersistenceFake Google Software Update folderKeeps the malware active after infection

Reaper bypasses Terminal-focused protections

Earlier macOS infostealer campaigns often used Terminal-based tricks. Apple has added protections against some of those flows, but Reaper shifts execution into Script Editor.

This matters because Script Editor is a normal macOS application. The malware can run through a user-approved AppleScript flow without dropping a traditional malicious binary at the first stage.

After execution starts, Reaper checks the user’s local settings by reading the com.apple.HIToolbox.plist file. If it detects Russian input sources or signs that the system belongs to the Commonwealth of Independent States region, it sends a blocked telemetry event and exits.

Fake Google Update creates persistence

Before finishing its initial run, Reaper creates a directory that imitates Google Software Update. The path sits under the user’s Library folder and looks similar to legitimate Google updater components.

The malware places a base64-decoded bash script named GoogleUpdate inside that fake application directory. It then registers a LaunchAgent named com.google.keystone.agent.plist, borrowing the naming style of Google’s legitimate Keystone update system.

The LaunchAgent runs every 60 seconds. Each time it runs, the script sends system information to the attacker’s /api/bot/heartbeat endpoint and waits for a response.

  • The fake updater path is ~/Library/Application Support/Google/GoogleUpdate.app/Contents/MacOS/GoogleUpdate.
  • The malicious LaunchAgent is ~/Library/LaunchAgents/com.google.keystone.agent.plist.
  • The heartbeat endpoint is /api/bot/heartbeat.
  • If the server returns code, the malware writes it to /tmp/.c.sh.
  • The temporary script runs with the current user’s privileges and is then deleted.

The backdoor can run new commands

The GoogleUpdate persistence script does more than keep the malware alive. It also gives attackers a lightweight backdoor for continued access.

If the command-and-control server returns a code payload, the script decodes it, writes it to a hidden temporary shell script, executes it, and removes it after execution. This gives the attacker a way to run new commands without leaving a long-lived script in the same location.

The AppleScript Filegrabber handler is similar to that used by AMOS Atomic and other macOS infostealers (Source – SentinelOne)

That design makes the malware more flexible. Operators can steal data during the first run, then return later with additional commands or payloads if the Mac remains infected.

What Reaper steals from Macs

Reaper keeps the core data theft behavior associated with SHub. It targets browser data, macOS Keychain material, iCloud account data, Telegram session data, developer-related files, and cryptocurrency wallets.

The malware targets several browsers, including Chrome, Firefox, Brave, Edge, Opera, Vivaldi, Arc, and Orion. It also checks browser extensions for password managers and crypto wallets such as 1Password, Bitwarden, LastPass, MetaMask, and Phantom.

The FileGrabber component searches Desktop and Documents folders for files likely to contain business, finance, or access information. SentinelOne says it targets document and data file types under 2MB, PNG images under 6MB, and applies a 150MB total collection cap.

Data typeExamples
BrowsersChrome, Firefox, Brave, Edge, Opera, Vivaldi, Arc, Orion
Password managers1Password, Bitwarden, LastPass browser extensions
Crypto walletsMetaMask, Phantom, Exodus, Atomic, Ledger Live, Trezor Suite
macOS dataKeychain, iCloud account data, Telegram sessions
User filesDocuments, wallet files, keys, JSON files, spreadsheets, RDP files

Reaper also hijacks desktop crypto wallets

After stealing user data, Reaper looks for cryptocurrency wallet applications installed on the Mac. SentinelOne says it searches for Exodus, Atomic Wallet, Ledger Wallet, Ledger Live, and Trezor Suite.

If it finds a targeted wallet, it downloads a modified app.asar file from the command-and-control server. It then stops the active wallet process and replaces the legitimate application file.

The malware also clears quarantine attributes and uses ad hoc code signing to help the modified app run. This can let attackers continue targeting wallet activity even after the first wave of credential theft.

Anti-analysis checks help the malware stay hidden

The fake installer pages do more than deliver malware. They also fingerprint visitors before triggering the next stage.

The web pages collect IP address, location data, WebGL details, VPN indicators, virtual machine signals, and installed browser extension data. That information helps the operators decide whether the visitor looks like a real victim or a researcher.

The pages also interfere with security analysis. They override console functions, watch for developer keystrokes, run debugger loops, and can replace the page with a Russian-language access denied message when DevTools activity is detected.

Indicators of compromise

Security teams can use the following indicators for threat hunting. Network indicators are defanged to prevent accidental access.

TypeIndicatorDescription
Domainhebsbsbzjsjshduxbs[.]xyzPrimary command-and-control domain
Domainmlcrosoft[.]co[.]comFake WeChat lure domain
Domainqq-0732gwh22[.]comFake WeChat lure domain
Domainmlroweb[.]comFake Miro lure domain
Endpointhxxps://hebsbsbzjsjshduxbs[.]xyz/api/bot/heartbeatBackdoor heartbeat endpoint
Endpointhxxps://hebsbsbzjsjshduxbs[.]xyz/gateCommand-and-control endpoint
Endpointhxxps://hebsbsbzjsjshduxbs[.]xyz/gate/chunkChunked file upload endpoint

Files and paths defenders should monitor

The fake Google Software Update path is one of the strongest signs of infection. A legitimate Google Keystone installation should not match this suspicious behavior or act as a user-level backdoor.

Defenders should also watch for temporary archives and scripts in /tmp, especially after Script Editor or osascript activity.

Unexpected LaunchAgents that imitate trusted vendors should receive immediate review. Attackers often choose names that look familiar because users and analysts may overlook them during routine checks.

Path or identifierPurpose
~/Library/Application Support/Google/GoogleUpdate.app/Contents/MacOS/GoogleUpdateFake GoogleUpdate backdoor script
~/Library/LaunchAgents/com.google.keystone.agent.plistMalicious LaunchAgent persistence file
/tmp/.c.shTemporary script used for command execution
/tmp/shub_log.zipStaged exfiltration archive
/tmp/shub_split.shArchive-splitting script
/tmp/shub_mzip_*.zipSegmented exfiltration chunks
Build name: ReaperInternal build name reported by SentinelOne

How Mac users can reduce risk

Mac users should avoid any website that asks them to open Script Editor and run a manual security update. Apple does not deliver XProtectRemediator updates by asking users to run hidden AppleScript commands from a website.

Users should download apps only from official developer websites or the Mac App Store. Search ads, typo-squatted domains, and lookalike download pages remain common delivery paths for macOS stealers.

Anyone who ran a suspicious installer should disconnect from sensitive accounts, change passwords from a clean device, and check for unknown LaunchAgents in the user Library folder.

  • Do not run AppleScript commands from websites claiming to offer security updates.
  • Download WeChat, Miro, and other apps only from official sources.
  • Check URLs carefully before downloading software.
  • Review ~/Library/LaunchAgents for suspicious Google-like plist files.
  • Watch for unexpected Script Editor, osascript, or curl activity.
  • Rotate passwords and wallet credentials if infection is suspected.
  • Use endpoint protection that detects script-based macOS malware behavior.

Why SHub Reaper matters

Reaper shows how macOS infostealers are becoming more polished and harder for ordinary users to spot. The attack does not rely on one unfamiliar malware file. It layers trusted brand names, normal macOS tools, and user-approved script execution.

The fake Google Software Update LaunchAgent also changes the risk profile. Reaper is not only a one-time stealer. It can keep contacting the attacker’s infrastructure and run new code later.

For businesses, the threat goes beyond personal credential theft. A single infected Mac can expose browser sessions, cloud tokens, internal documents, developer files, and wallet data, creating both security and financial risk.

FAQ

What is SHub Reaper on macOS?

SHub Reaper is a macOS infostealer variant analyzed by SentinelOne. It uses fake app installers, AppleScript execution, and a fake Google Software Update LaunchAgent to steal data and maintain access on infected Macs.

How does Reaper infect macOS users?

Reaper uses fake WeChat and Miro installer pages that launch Script Editor through the applescript:// URL scheme. The script pretends to download an Apple security update while fetching and running the malware payload.

What does the fake Google Software Update LaunchAgent do?

The fake LaunchAgent runs a GoogleUpdate script every 60 seconds. The script sends system details to the attacker’s heartbeat endpoint and can execute returned code through a temporary shell script.

What data does SHub Reaper steal?

Reaper targets browser data, password manager extensions, macOS Keychain data, iCloud information, Telegram sessions, cryptocurrency wallets, and files from Desktop and Documents folders.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages