macOS Stealer Spoofs Apple, Google, and Microsoft in a Single Attack Chain
A new variant of SHub Stealer dubbed 'Reaper' targets macOS users through fake WeChat and Miro installers, employing sophisticated multi-stage delivery chains that spoof Apple, Google, and Microsoft services. The malware leverages the applescript:// URL scheme to bypass Terminal-based defenses, conducting extensive fingerprinting and anti-analysis checks before execution. Reaper harvests browser credentials, cryptocurrency wallets, developer configurations, iCloud data, and Telegram sessions. It includes an AMOS-style document theft module targeting files under 150MB with chunked uploads. The variant establishes persistence through a fake Google Software Update LaunchAgent and installs a backdoor for remote code execution. The infection specifically avoids CIS regions and employs extensive anti-analysis techniques including WebGL fingerprinting, VM detection, and DevTools interference.
Pulse ID: 6a0b51f39a34872f37d37c9f
Pulse Link: https://otx.alienvault.com/pulse/6a0b51f39a34872f37d37c9f
Pulse Author: AlienVault
Created: 2026-05-18 17:52:51
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AMOS #BackDoor #Browser #Cloud #CyberSecurity #Google #InfoSec #Mac #MacOS #Malware #Microsoft #OTX #OpenThreatExchange #RAT #RemoteCodeExecution #Telegram #bot #cryptocurrency #AlienVault







