SHub Reaper Stealer Backdoors macOS with Multi-Brand Spoofing
The SHub Reaper stealer combines credential theft, wallet hijacking, and document exfiltration with persistent backdoor access on macOS, distributed through fake WeChat and Miro installers while spoofing Apple, Google, and Microsoft to evade detection.
The SHub Reaper stealer is a macOS infostealer that blends traditional stealer functionality with persistent backdoor capabilities. It is distributed through social engineering lures such as fake WeChat and Miro installers. This malware demonstrates a shift in macOS malware behavior, moving away from ClickFix social engineering to Apple script-based execution to evade detection. SHub Reaper leverages a unique multi-brand spoofing technique, impersonating Apple, Google, and Microsoft across the infection chain. The malware installs a fake Google Update framework to maintain persistence and establishes a backdoor, allowing for arbitrary command execution and continuous compromise of the infected system. This represents an evolution in macOS infostealers, combining “smash-and-grab” data theft with long-term access and control.
Attack Chain
- The attack starts with malicious web pages offering fake Miro and WeChat installers.
- Victims download and execute the fake installers, initiating the infection chain.
- The malware may be hosted on a typosquatted Microsoft domain.
- The installer executes under the guise of a fake Apple security update.
- SHub Reaper installs a fake Google Update framework under the user Library paths for persistence.
- A LaunchAgent is registered using Google Keystone-style naming conventions to ensure the malware runs regularly.
- The malware beacons to a command and control server every 60 seconds, supporting arbitrary command execution.
- The malware steals credentials, hijacks crypto wallets, and exfiltrates documents while maintaining persistent backdoor access.
Impact
Successful SHub Reaper infections can lead to significant data loss, including sensitive credentials, cryptocurrency assets, and confidential documents. The persistent backdoor allows attackers to maintain long-term access to compromised systems, enabling further data theft, command execution, and potential lateral movement within the network. The shift from ClickFix tactics to AppleScript execution renders traditional terminal-centric detections ineffective, increasing the risk of successful compromise. This combination of stealer and backdoor capabilities makes SHub Reaper a particularly dangerous threat to macOS users.
Recommendation
- Monitor for unexpected invocations of Script Editor (
Script Editor.app) to detect potential AppleScript-based execution, as outlined by SentinelOne’s report. - Deploy the Sigma rule detecting
osascriptspawningcurlor shell interpreters to identify malicious AppleScript activity. - Implement the Sigma rule for detecting browser-to-AppleScript execution chains to identify potential initial access vectors.
- Educate macOS users to be wary of software installers from untrusted sources and to verify the authenticity of software updates, as this is the primary infection vector.
- Monitor user Library paths for the installation of unexpected Google Update frameworks and LaunchAgents with Google Keystone-style naming conventions, as these are indicators of persistence.
Detection coverage 3
Detect osascript Spawning Curl or Shell Interpreters
highDetects osascript (AppleScript interpreter) spawning curl or shell interpreters, indicative of malicious AppleScript execution.
Detect Browser to AppleScript Execution Chain
mediumDetects browser processes initiating AppleScript execution via the applescript:// URL scheme, potentially indicating malicious activity.
Detect Suspicious Script Editor Usage
lowDetects unexpected use of Script Editor.app which may indicate malicious applescript execution.
Detection queries are available on the platform. Get full rules →