A new variant of the infostealer known as SHub, baptized as Reaper, shows that attackers continue to adapt their techniques to overcome the safety improvements of macOS: instead of deceiving victims to stick commands in Terminal, they now use the URL scheme applescript: / / to open the Editor Script with an already loaded malicious AppleScript that shows a false security update and, if the user presses "Run," download and run code that installs a backdoor and steals sensitive data.
The sophistication of the attack is not only in social engineering - the decoy are false installers of popular applications such as WeChat or Miro hosted in domains that mimic the legitimate - but in the technical chain: the script dynamically builds the command that the payload brings, hides parts under ASCII art, escapes from analysis by fingerprinting virtual machines and VPNs, and goes to list browser extensions to detect password managers and cryptowallet extensions before deciding whether to proceed with the infection.

What he steals and how: Reaper requests the macOS password to access the keychain (Keychain) and decipher credentials, then search for browser data (Chrome, Firefox, Edge and others), wallets extensions such as MetaMask and Phantom, desktop purse applications (Exodus, Electrum, Ledger Live, etc.), Telegram sessions, iCloud data and desktop files and documents that may contain financial information. It also includes a "Filegrabber" that collects selected files with size and volume limits, and a routine that if you detect wallet customers ends legitimate processes and replaces central files (e.g., app.asar in electron-based applications) with malicious binaries downloaded from C2.
To evade protections like Gatekeeper and macOS warnings, malware clean quarantine attributes with xattr -cr and applies ad hoc to the modified bundle; its persistence ensures it by installing a LaunchAgent that runs regularly (every minute) by posing as a legitimate update and serving as a beacon to receive and execute additional payloads.
The implications are clear: individual users, professionals who handle private keys or credentials and companies with Mac in your park are objective. The combination of credentials theft, file exfiltration and ability to install remote access tools makes Reaper a platform that can evolve into more impact attacks, including the removal of wallets funds or lateral movement in corporate environments.
For the technical analysis and indicators published by the researchers, read the SentinelOne report on SHub Reaper: SentinelOne: SHub Reaper. For generic recommendations on malware hygiene and initial response practices, the CERT / CISA guide provides good guidelines: CISA: Protect your computer against malicious code.

Immediate recommended actions for users: do not run or "Run" on Editor Script windows that appear after downloading something from the web, always check the download domains directly from the supplier's official website, and prefer signed and verifiable packages. If you suspect your Mac has been compromised, disconnect it from the network, make safe backup and consider revoking and rotating credentials and keys. For cryptomoneda users, move funds to cold wallets (hardware wallets) and avoid operating from equipment that may be compromised.
Recommended actions for security administrators and equipment: monitor the execution of osascript and Script Editor from browsers or downloads, review recent LaunchAgens and entries that mimic legitimate updaters, detect files with deleted quarantine attributes ( xattr) or unusual ad hoc signatures, and search for app.asar file replacements in wallet applications. Integrate detection rules for atypical outgoing traffic to the Telegram API or C2-associated domains and deploy EDR tools that track zsh / curl process creation that download and run scripts from remote locations.
Finally, keep the system up-to-date, apply restriction policies on browsers and extensions (block unapproved extensions), promote the principle of less privilege (do not use administrator accounts for daily tasks) and educate users on social engineering techniques as false updates and "ClickFix" -style promptts. The threat is double: technical and human; reducing the attack surface requires technical controls and changes in user behavior.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...