{"id":249812,"date":"2025-12-24T21:04:52","date_gmt":"2025-12-24T21:04:52","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/249812\/"},"modified":"2025-12-24T21:04:52","modified_gmt":"2025-12-24T21:04:52","slug":"new-macsync-macos-stealer-uses-signed-app-to-bypass-apple-gatekeeper","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/249812\/","title":{"rendered":"New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper"},"content":{"rendered":"<p>\ue802Dec 24, 2025\ue804Ravie LakshmananMalware \/ Endpoint Security<\/p>\n<p><a href=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/apple-macos.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/apple-macos.jpg\" alt=\"MacSync macOS Stealer\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" title=\"MacSync macOS Stealer\"\/><\/a><\/p>\n<p>Cybersecurity researchers have discovered a new variant of a macOS information stealer called <strong>MacSync<\/strong> that&#8217;s delivered by means of a digitally signed, notarized Swift application masquerading as a messaging app installer to bypass Apple&#8217;s Gatekeeper checks.<\/p>\n<p>&#8220;Unlike earlier MacSync Stealer variants that primarily rely on drag-to-terminal or <a href=\"https:\/\/thehackernews.com\/2025\/11\/large-scale-clickfix-phishing-attacks.html\" rel=\"noopener nofollow\" target=\"_blank\">ClickFix<\/a>-style techniques, this sample adopts a more deceptive, hands-off approach,&#8221; Jamf researcher Thijs Xhaflaire <a href=\"https:\/\/www.jamf.com\/blog\/macsync-stealer-evolution-code-signed-swift-malware-analysis\/\" rel=\"noopener nofollow\" target=\"_blank\">said<\/a>.<\/p>\n<p>The Apple device management firm and security company said the latest version is distributed as a code-signed and notarized Swift application within a disk image (DMG) file named &#8220;zk-call-messenger-installer-3.9.2-lts.dmg&#8221; that&#8217;s hosted on &#8220;zkcall[.]net\/download.&#8221;<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/ransomware_dragon_d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/ransomware_dragon_d.png\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>The fact that it&#8217;s signed and notarized means it can be run without being blocked or flagged by built-in security controls like Gatekeeper or XProtect. Despite this, the installer has been found to display instructions prompting users to right-click and open the app \u2013 a common tactic used to sidestep such safeguards. Apple has since revoked the code signing certificate. <\/p>\n<p>The Swift-based dropper then performs a series of checks before downloading and executing an encoded script through a helper component. This includes verifying internet connectivity, enforcing a minimum execution interval of around 3600 seconds to enforce a rate limit, and removing quarantine attributes and validating the file prior to execution.<\/p>\n<p>&#8220;Notably, the curl command used to retrieve the payload shows clear deviations from earlier variants,&#8221; Xhaflaire explained. &#8220;Rather than using the commonly seen -fsSL combination, the flags have been split into -fL and -sS, and additional options like &#8211;noproxy have been introduced.&#8221;<\/p>\n<p><a href=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/macos.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/macos.jpg\" alt=\"\" border=\"0\" data-original-height=\"1091\" data-original-width=\"1280\"\/><\/a><\/p>\n<p>&#8220;These changes, along with the use of dynamically populated variables, point to a deliberate shift in how the payload is fetched and validated, likely aimed at improving reliability or evading detection.&#8221;<\/p>\n<p>Another evasion mechanism used in the campaign is the use of an unusually large DMG file, inflating its size to 25.5 MB by embedding unrelated PDF documents.<\/p>\n<p>The Base64-encoded payload, once parsed, corresponds to <a href=\"https:\/\/g0njxa.medium.com\/approaching-stealers-devs-a-brief-interview-with-macsync-ex-mentalpositive-62504db3e761\" rel=\"nofollow noopener\" target=\"_blank\">MacSync<\/a>, a rebranded version of <a href=\"https:\/\/moonlock.com\/new-mac-stealer-spreading\" rel=\"nofollow noopener\" target=\"_blank\">Mac.c<\/a> that first emerged in April 2025. MacSync, per MacPaw&#8217;s Moonlock Lab, <a href=\"https:\/\/moonlock.com\/macc-stealer-macsync-backdoor\" rel=\"nofollow noopener\" target=\"_blank\">comes fitted<\/a> with a fully-featured Go-based agent that goes beyond simple data theft and enables remote command and control capabilities.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/zscaler-ai-event-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/zz-d.png\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>It&#8217;s worth noting that code-signed versions of malicious DMG files mimicking Google Meet have also been observed in attacks propagating other macOS stealers like <a href=\"https:\/\/www.jamf.com\/blog\/signed-and-stealing-uncovering-new-insights-on-odyssey-infostealer\/\" rel=\"noopener nofollow\" target=\"_blank\">Odyssey<\/a>. That said, threat actors have continued to rely on unsigned disk images to deliver <a href=\"https:\/\/www.jamf.com\/blog\/jtl-digitstealer-macos-infostealer-analysis\/\" rel=\"noopener nofollow\" target=\"_blank\">DigitStealer<\/a> as recently as last month.<\/p>\n<p>&#8220;This shift in distribution reflects a broader trend across the macOS malware landscape, where attackers increasingly attempt to sneak their malware into executables that are signed and notarized, allowing them to look more like legitimate applications,&#8221; Jamf said.<\/p>\n","protected":false},"excerpt":{"rendered":"\ue802Dec 24, 2025\ue804Ravie LakshmananMalware \/ Endpoint Security Cybersecurity researchers have discovered a new variant of a macOS information&hellip;\n","protected":false},"author":2,"featured_media":249813,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[21715,21710,21703,21702,21704,21705,21706,3600,18,21707,21708,21712,19,21713,17,11951,21711,21709,82,21714],"class_list":{"0":"post-249812","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-eire","17":"tag-hacker-news","18":"tag-hacking-news","19":"tag-how-to-hack","20":"tag-ie","21":"tag-information-security","22":"tag-ireland","23":"tag-network-security","24":"tag-ransomware-malware","25":"tag-software-vulnerability","26":"tag-technology","27":"tag-the-hacker-news"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ie\/115776585388840254","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/249812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=249812"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/249812\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/249813"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=249812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=249812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=249812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}