Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Elon Musk is serious about orbiting data centers

NASA astronauts can now bring cell phones on missions to the moon

OpenAI launches a way for enterprises to build and manage AI agents

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New MacSync macOS stealer uses signed apps to bypass Apple gatekeeper
Identity

New MacSync macOS stealer uses signed apps to bypass Apple gatekeeper

userBy userDecember 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 24, 2025Ravi LakshmananMalware/Endpoint Security

MacSync macOS Stealer

Cybersecurity researchers have discovered a new variant of the macOS information stealer called MacSync, which is delivered by digitally signed and notarized Swift applications disguised as messaging app installers that bypass Apple’s Gatekeeper checks.

“Unlike previous MacSync Stealer variants that primarily rely on device dragging and ClickFix-style techniques, this sample takes a more deceptive and artificial approach,” said Jamf researcher Thijs Xhaflaire.

The latest version is distributed as a code-signed and notarized Swift application in a disk image (DMG) file named zk-call-messenger-installer-3.9.2-lts.dmg hosted on zkcall, Apple’s device management and security company said.[.]Net/Download. ”

cyber security

The fact that it’s signed and notarized means it can run without being blocked or flagged by built-in security controls like Gatekeeper and XProtect. Nevertheless, the installer has been found to prompt users to right-click and open the app. This is a common tactic used to circumvent such safeguards. Apple subsequently revoked the code signing certificate.

The Swift-based dropper then performs a series of checks before downloading and running the encoded script through the helper component. This includes validating internet connectivity, enforcing a minimum execution interval of approximately 3600 seconds to enforce rate limits, removing quarantine attributes and validating files before execution.

“In particular, the curl command used to retrieve the payload shows a clear departure from previous variants,” Xhaflaire explained. “Rather than using the commonly seen -fsSL combination, the flags have been split into -fL and -sS, and additional options like –noproxy have been introduced.”

“These changes, along with the use of dynamically set variables, indicate intentional changes to the method of payload retrieval and validation, possibly aimed at improving reliability or evading detection.”

Another evasion mechanism used in this campaign is the use of unusually large DMG files, which increase in size to 25.5 MB by embedding unrelated PDF documents.

Once parsed, the Base64-encoded payload corresponds to MacSync, a rebranded version of Mac.c that first appeared in April 2025. According to MacPaw’s Moonlock Lab, MacSync includes a full-featured Go-based agent that goes beyond simple data theft and enables remote command and control capabilities.

cyber security

Note that code-signed versions of malicious DMG files that mimic Google Meet have also been observed in attacks propagating other macOS stealers such as Odyssey. However, as recently as last month, attackers continued to rely on unsigned disk images to deliver DigitStealer.

“This change in distribution reflects a broader trend across the macOS malware landscape, where attackers are increasingly attempting to sneak malware into signed and notarized executable files that appear to be legitimate applications,” Jamf said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article9 Top Biotech Startups in Disrupt Startup Battlefield
Next Article Waymo explains why robot taxis got stuck during San Francisco power outage
user
  • Website

Related Posts

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

February 5, 2026

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

February 5, 2026

Buyer’s Guide to AI Usage Control

February 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Elon Musk is serious about orbiting data centers

NASA astronauts can now bring cell phones on missions to the moon

OpenAI launches a way for enterprises to build and manage AI agents

Anthropic releases Opus 4.6 with new “Agent Teams”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.