	{"id":94539,"date":"2021-09-24T11:31:16","date_gmt":"2021-09-24T18:31:16","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=94539"},"modified":"2021-10-05T08:05:07","modified_gmt":"2021-10-05T15:05:07","slug":"osx-zuru-mac-malware-spread-through-trojan-apps","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/","title":{"rendered":"OSX\/ZuRu Mac malware spread through Trojan apps"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-94541\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-600x300-1.png\" alt=\"OSX\/ZuRu Mac Trojan horse malware disguised as fake iTerm2 app.\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don&#8217;t claim to be Adobe Flash Player installers this time.<\/p>\n<p>Seekers of several macOS applications\u2014notably including iTerm2, a third-party Terminal app for Mac\u2014may have unintentionally downloaded an <strong>OSX\/ZuRu<\/strong> Trojan horse.<\/p>\n<p>Let&#8217;s examine this recent malware, how it spread, and how to eliminate an infection.<\/p>\n<h3>How was OSX\/ZuRu discovered?<\/h3>\n<p>Pan Xiaopan discovered the first in-the-wild sample of OSX\/ZuRu while searching for the Mac app iTerm2 on the Chinese search engine Baidu.<\/p>\n<div id=\"attachment_94549\" style=\"width: 964px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-94549\" loading=\"lazy\" class=\"size-full wp-image-94549\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Baidu-poisoned-search-results-for-iTerm2-led-to-OSX-ZuRu-malware.jpg\" alt=\"Baidu poisoned search results for iTerm2 led to OSX\/ZuRu malware.\" width=\"600\" height=\"316\" \/><p id=\"caption-attachment-94549\" class=\"wp-caption-text\">Baidu poisoned search results for iTerm2 led to OSX\/ZuRu malware. (Screenshot: <a href=\"https:\/\/zhuanlan.zhihu.com\/p\/408746101\" target=\"_blank\" rel=\"noopener\">Pan Xiaopan<\/a>)<\/p><\/div>\n<p>Rather than the top result being the legitimate iTerm2, the first link actually led to a malware site designed to look virtually indistinguishable from the legitimate software&#8217;s homepage. This technique of introducing malicious results into search queries is known as <strong>search engine poisoning<\/strong>.<\/p>\n<p>Attempting to download iTerm2 from the lookalike site would instead download a disk image infected with an OSX\/ZuRu Trojan horse.<\/p>\n<p>The real iTerm2 site is hosted at iterm2.com, which appeared as the second result in the Baidu search. The malicious site that linked to the Trojan disk image used a very similar domain: <code>iterm2[.]net<\/code>.<\/p>\n<p>Baidu has reportedly removed the fraudulent link from its search results.<\/p>\n<p>Researchers later found several other disk images infected with OSX\/ZuRu, disguised as other Mac software including Microsoft Remote Desktop, <span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Navicat,<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">SecureCRT,<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">and also reportedly SnailSVN.<\/span><\/p>\n<h3>What does OSX\/ZuRu do to an infected Mac?<\/h3>\n<p>If a user is tricked into running the Trojan horse, OSX\/ZuRu downloads and runs a Python script that collects various information from an infected Mac, including but not limited to:<\/p>\n<ul>\n<li><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">the user&#8217;s macOS Keychain database<\/span><\/li>\n<li>the user&#8217;s bash and zsh Terminal command history<\/li>\n<li>the user&#8217;s iTerm2 saved state<\/li>\n<li>the user&#8217;s ssh keys and known hosts<\/li>\n<li>the system&#8217;s \/etc\/hosts file<\/li>\n<\/ul>\n<p>Many of these files could contain highly sensitive information such as passwords and private keys.<\/p>\n<p>The malware then attempts to exfiltrate a zip archive of this data to the server from which the Python script was downloaded.<\/p>\n<p>An outbound firewall, such as <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego NetBarrier X9<\/a>, can block malware from exfiltrating data from your Mac.<\/p>\n<h3>How can one remove or prevent OSX\/ZuRu and other threats?<\/h3>\n<p>Given that Apple&#8217;s threat mitigation features such as notarization, Gatekeeper, XProtect, and MRT do not block many types of threats, it is evident that Apple\u2019s own macOS protection methods are insufficient by themselves.<\/p>\n<p><em>Related: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"hOfypKiNUx\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Do Macs need antivirus software?&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/embed\/#?secret=hOfypKiNUx\" data-secret=\"hOfypKiNUx\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate <strong>OSX\/ZuRu<\/strong>\u00a0malware.<\/p>\n<p>VirusBarrier is designed by Mac security experts, and it protects against a much wider variety of malware than Apple\u2019s mitigation methods.<\/p>\n<p>If you believe your Mac may have been infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time scanning<\/a>, such as <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego VirusBarrier X9<\/a>\u2014which also protects Macs from M1-native malware, cross-platform malware, and more. <strong>Intego recently earned a 100% detection rating for Mac malware<\/strong> in two independent tests conducted by <a href=\"https:\/\/www.av-comparatives.org\/tests\/mac-security-test-review-2021\/#intego\" target=\"_blank\" rel=\"noopener\">AV-Comparatives<\/a> and <a href=\"https:\/\/www.av-test.org\/en\/antivirus\/home-macos\/macos-bigsur\/june-2021\/intego-virusbarrier-10.9-215205\/\" target=\"_blank\" rel=\"noopener\">AV-TEST<\/a>.<\/p>\n<p><span style=\"font-size: small;\">Note: Intego customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected from these threats. It is best to upgrade to the latest versions of VirusBarrier and macOS, if possible, to ensure your Mac gets all the latest security updates from Apple<\/span><span style=\"font-size: small;\">.<\/span><\/p>\n<h3>Indicators of compromise (IoCs)<\/h3>\n<p>Following are some specific ways to identify whether a Mac may have been infected by OSX\/ZuRu.<\/p>\n<p>Apple has since revoked the Developer ID that was used for signing this malware. The developer name and Team ID of the revoked dev account is:<\/p>\n<pre>Jun Bi (AQPZ6F3ASY)<\/pre>\n<p>The following SHA-256 file hashes belong to known OSX\/ZuRu files associated with this malware campaign.<\/p>\n<pre>04e1d0e1b6aa0852677f6bbf64a60ea33bc0b07b197280b22a155f8e94aead5c\r\n0560072ef7055802e977865324d95171126fe68cb797d4ebc0bda328435014fa\r\n1e462f8716275dbae6acb3ff4f7a95624c1afb23c5069fa42a14ed49c2588921\r\n2c269ff4216dc6a14fd81ffe541994531b23a1d8e0fbd75b9316a9fa0e0d5fef\r\n4e8287b61b0269e0d704c6d064cb584c1378e9b950539fea366ee304f695743f\r\n548c7e456d11d9acf06589be1a13a8c4229a3e41139570ee8e078e421ff0890c\r\n5ca2fb207762e886dd3336cf1cb92c28f096a5fbb1798ea6721b7c94c1395259\r\n6df91af12c87874780cc9d49e700161e1ead71ae045954adbe7633ec9e5e45ff\r\n7874df70f3e732af5676dd6f25eeb89de0cfaa84d5b39aca2cfc6f5bff6a23a7\r\nae0510032cd4699ef17de7ed1587918ffcd7ff7c9a77fc45f9d68effe2934132\r\nb556ff7d0095ddf87535b3b9c3e40aacdd65f4dbe5ceedb31613826857161bfb\r\ne5126f74d430ff075d6f7edcae0c95b81a5e389bf47e4c742618a042f378a3fa\r\nf1277ace85516f9decce8d86f5faceb9bb2ac9dd4faed5563c98b00df0545c3f\r\nffb0a802fdf054d4988d68762d9922820bdc3728f0378fcd6c4ed28c06da5cf0<\/pre>\n<p>The following domains and IP address have been observed to have ties with this malware:<\/p>\n<pre>kaidingle[.]com\r\n47.75.123[.]111\r\niterm2[.]net\r\nrjxz.jxhwst[.]top<\/pre>\n<p>Any recent network traffic to or from any of these domains should be considered a possible sign of an infection.<\/p>\n<h3>Is OSX\/ZuRu known by any other names?<\/h3>\n<p>Other vendors&#8217; names for threat components from this malware campaign may include variations of: DMG\/ZuRu.A, Mac.BackDoor.CobaltStrike.2, Mac.Trojan.ZuRu, MacOS:CobalStrike-C, MacOS:ZuRu-A, OSX\/CobaltStrike.A, OSX\/CobaltStrike.Beacon.B, OSX\/iTerm, OSX\/Spy.ZuRu.A, OSX\/ZuRu-A, Python:Agent-CC, Trojan-Spy.OSX.Zuru, Trojan:MacOS\/Multiverze, Trojan:Script\/Wacatac.B, Trojan:Win32\/Casdet!rfn, Trojan.MAC.ZuRu.A, Trojan.MacOS.ZURU, Trojan.OSX.Zuru, and Win32.Trojan-spy.Zuru.<\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more technical details of the recent OSX\/ZuRu campaign, you can read <a href=\"https:\/\/objective-see.com\/blog\/blog_0x66.html\" target=\"_blank\" rel=\"noopener\">Patrick Wardle&#8217;s write-up<\/a> (and <a href=\"https:\/\/zhuanlan.zhihu.com\/p\/408746101\" target=\"_blank\" rel=\"noopener\">Pan Xiaopan&#8217;s original write-up, in Chinese<\/a>).<\/p>\n<p>We discussed <strong>OSX\/ZuRu<\/strong> on <a href=\"https:\/\/podcast.intego.com\/206\">episode 206<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">follow the podcast<\/a> to make sure you don\u2019t miss any episodes! You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+Z0S3k_3P?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Be sure to follow Intego on your favorite social media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don&#8217;t claim to be Adobe Flash Player installers this time. Seekers of several macOS applications\u2014notably including iTerm2, a third-party Terminal app for Mac\u2014may have unintentionally downloaded an OSX\/ZuRu Trojan horse. Let&#8217;s examine this recent malware, [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":94542,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don&#039;t claim to be Adobe Flash Player\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSX\/ZuRu Mac malware spread through Trojan apps - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don&#039;t claim to be Adobe Flash Player\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-24T18:31:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-05T15:05:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"OSX\/ZuRu Mac Trojan horse malware disguised as fake iTerm2 app\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/\",\"name\":\"OSX\/ZuRu Mac malware spread through Trojan apps - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#primaryimage\"},\"datePublished\":\"2021-09-24T18:31:16+00:00\",\"dateModified\":\"2021-10-05T15:05:07+00:00\",\"description\":\"A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don't claim to be Adobe Flash Player\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSX\/ZuRu Mac malware spread through Trojan apps\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"OSX\/ZuRu Mac malware spread through Trojan apps\",\"datePublished\":\"2021-09-24T18:31:16+00:00\",\"dateModified\":\"2021-10-05T15:05:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#webpage\"},\"wordCount\":878,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png\",\"keywords\":[\"Trojan Horse\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don't claim to be Adobe Flash Player","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/","og_locale":"en_US","og_type":"article","og_title":"OSX\/ZuRu Mac malware spread through Trojan apps - The Mac Security Blog","og_description":"A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don't claim to be Adobe Flash Player","og_url":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2021-09-24T18:31:16+00:00","article_modified_time":"2021-10-05T15:05:07+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png","width":400,"height":260,"caption":"OSX\/ZuRu Mac Trojan horse malware disguised as fake iTerm2 app"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/","name":"OSX\/ZuRu Mac malware spread through Trojan apps - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#primaryimage"},"datePublished":"2021-09-24T18:31:16+00:00","dateModified":"2021-10-05T15:05:07+00:00","description":"A new variety of Mac Trojan horse malware has been caught in the wild. And, surprisingly, the latest Trojan horses don't claim to be Adobe Flash Player","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OSX\/ZuRu Mac malware spread through Trojan apps"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"OSX\/ZuRu Mac malware spread through Trojan apps","datePublished":"2021-09-24T18:31:16+00:00","dateModified":"2021-10-05T15:05:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#webpage"},"wordCount":878,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png","keywords":["Trojan Horse"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-zuru-mac-malware-spread-through-trojan-apps\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/OSX-ZuRu-Mac-Trojan-horse-malware-fake-iTerm2-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oAP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94539"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=94539"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94539\/revisions"}],"predecessor-version":[{"id":94665,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94539\/revisions\/94665"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/94542"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=94539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=94539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=94539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}