A new variant of the SHub infostealer known as Reaper is targeting macOS users by deploying a malicious LaunchAgent that mimics legitimate Google software update services for persistent access. This threat is particularly significant for tech professionals because it exploits trusted brand identities across the entire infection chain, using AppleScript to bypass standard security detections and execute core extraction logic directly in memory. Organizations must monitor for unauthorized background processes and unexpected outbound connections from Script Editor to protect sensitive developer credentials and financial data.
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.





