Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

New ZuRu Malware Variant Targeting Developers

By Jordyn Alger, Managing Editor
Keyboard

ic Ci via Unsplash

July 15, 2025

A new SentinelOne report reveals new artifacts associated with ZuRu, an Apple macOS malware. ZuRu typically spreads via trojanized versions of legitimate software. In May 2025, the malware was observed mimicking a cross platform SSH client and server management tool called Termius. 

Initially documented in September 2021, ZuRu was involved in a campaign hijacking searches for iTerm2 (a macOS Terminal app). ZuRu predominantly relies on sponsored web searches to spread, suggesting the malicious actors responsible for this malware are opportunistic rather than targeted. 

Below, security leaders share insights on this malware as well as risk mitigation strategies. 

Security Leaders Weigh In

Ms. Nivedita Murthy, Senior Staff Consultant at Black Duck:

MacOS users should be cautious of the evolving ZuRu trojan, which is being embedded in legitimate software. To protect themselves, users should adhere to software security best practices, such as downloading applications from trusted sources, such as the App or Play Store, keeping software up-to-date, and avoiding suspicious links. Software is an essential driver of growth and innovation at every company; therefore, IT departments should implement stricter controls on software installation, including restricting who can install software and from where. When updating software, a thorough review should be conducted to ensure that it doesn’t introduce new, undocumented functionality or compromise company data.

Heath Renfrow, Chief Information Security Officer and Co-founder at Fenix24:

The core issue isn’t a novel vulnerability in macOS — it’s social engineering. Organizations must double down on user education to reinforce that all software, even widely-used free tools, should only be downloaded from verified developer websites or trusted app stores. Avoiding sponsored links in search results is key.

ZuRu uses a modified version of the Khepri post-exploitation framework, meaning EDR tools capable of behavioral analytics (like CrowdStrike Falcon, SentinelOne, or eSentire) are essential. This is not just about detecting initial access — it’s about visibility into privilege escalation, persistence, and lateral movement. Teams should proactively threat hunt for signs of modified .app bundles and unusual process behavior related to Terminal utilities.

Mac admins should enforce code signing policies and use MDM solutions to restrict the execution of unsigned or improperly signed apps. While Apple’s Gatekeeper helps, in enterprise settings, more granular controls are often needed to stop ad hoc-signed binaries from executing.

Organizations often lack a tested IR playbook for macOS. This resurgence is a reminder to develop specific detection and response protocols for Apple endpoints — especially as more remote and hybrid workers rely on macOS tools for SSH, RDP, and database access.

Bottom line:

ZuRu’s distribution method and tooling indicate it’s less about targeting specific organizations and more about casting a wide net over users downloading administrative tools. The “fix” is layered: security controls, endpoint visibility, user discipline, and a plan for what to do when a Mac is compromised.

Eric Schwake, Director of Cybersecurity Strategy at Salt Security:

Although the macOS ZuRu malware is primarily a concern for endpoint and supply chain security, its broader implications affect an organization’s overall security, especially regarding APIs.

The risk lies in how compromised endpoints can directly access critical systems and data, much of which is managed and accessed through APIs. For example, trojanized tools such as SSH clients or database utilities can be used to steal credentials or remotely control systems. Attackers can then exploit legitimate API access to backend servers, cloud environments, and sensitive databases, enabling them to execute unauthorized commands, exfiltrate data, or alter services via APIs.

To defend against these threats, organizations should adopt a multi-layered security strategy. This involves strict software supply chain controls to prevent malicious applications from entering the environment, advanced Endpoint Detection and Response (EDR) tools to identify and quarantine malware such as ZuRu, and strong Identity and Access Management (IAM) to safeguard credentials. Crucially, robust API posture governance ensures APIs are designed with least privilege and configured adequately from the outset, complementing behavioral threat detection capabilities that actively monitor for suspicious API activity originating from potentially compromised endpoints. Such a comprehensive approach helps ensure that even if an endpoint is compromised, ongoing attempts to misuse credentials or access APIs are detected and blocked.

KEYWORDS: malware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Coding on screen

    Cybersecurity researchers discover malware targeting macOS users

    See More
  • Coding on monitor

    ESXi environments targeted with new Linux variant ransomware strain

    See More
  • Mac

    Security leaders discuss new phishing campaign targeting Mac users

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing