InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New MacSync macOS stealer uses signed apps to bypass Apple gatekeeper
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New MacSync macOS stealer uses signed apps to bypass Apple gatekeeper
Technology

New MacSync macOS stealer uses signed apps to bypass Apple gatekeeper

December 25, 2025 3 Min Read
Share

Cybersecurity researchers have discovered a new variant of the macOS information stealer. mac sink It is delivered by a digitally signed and notarized Swift application masquerading as a messaging app installer that bypasses Apple’s Gatekeeper checks.

“Unlike previous MacSync Stealer variants that primarily relied on device dragging and ClickFix-style techniques, this sample takes a more deceptive and artificial approach,” said Jamf researcher Thijs Xhaflaire.

The latest version is distributed as a code-signed and notarized Swift application in a disk image (DMG) file named zk-call-messenger-installer-3.9.2-lts.dmg hosted at zkcall(.)net/download, Apple’s device management and security company said.

The fact that it’s signed and notarized means it can run without being blocked or flagged by built-in security controls like Gatekeeper and XProtect. Nevertheless, the installer has been found to prompt users to right-click and open the app. This is a common tactic used to circumvent such safeguards. Apple subsequently revoked the code signing certificate.

The Swift-based dropper then performs a series of checks before downloading and running the encoded script through the helper component. This includes validating internet connectivity, enforcing a minimum execution interval of approximately 3600 seconds to enforce rate limits, removing quarantine attributes and validating files before execution.

“In particular, the curl command used to retrieve the payload shows a clear departure from previous variants,” Xhaflaire explained. “Rather than using the commonly seen -fsSL combination, the flags have been split into -fL and -sS, and additional options like –noproxy have been introduced.”

“These changes, along with the use of dynamically set variables, indicate intentional changes to the method of payload retrieval and validation, possibly aimed at improving reliability or evading detection.”

See also  Russian hackers create 4,300 fake travel websites to steal hotel guests' payment data

Another evasion mechanism used in this campaign is the use of unusually large DMG files, which increase in size to 25.5 MB by embedding unrelated PDF documents.

Once parsed, the Base64-encoded payload corresponds to MacSync, a rebranded version of Mac.c that first appeared in April 2025. According to MacPaw’s Moonlock Lab, MacSync includes a full-featured Go-based agent that goes beyond simple data theft and enables remote command and control capabilities.

Note that code-signed versions of malicious DMG files that mimic Google Meet have also been observed in attacks propagating other macOS stealers such as Odyssey. However, as recently as last month, attackers continued to rely on unsigned disk images to deliver DigitStealer.

“This change in distribution reflects a broader trend across the macOS malware landscape, where attackers are increasingly attempting to sneak malware into signed and notarized executable files that appear to be legitimate applications,” Jamf said.

Share This Article
Twitter Copy Link
Previous Article Minecraft criticized for calling out solo players "sad" In promotional messages for multiplayer subscription services. Minecraft criticized for calling out solo players "sad" In promotional messages for multiplayer subscription services.
Next Article How the Trump Administration Will Sell Public Land in 2025 How the Trump Administration Will Sell Public Land in 2025

You Might Also Like

Google's AI defenses built into Android now block 10 billion fraudulent messages per month
Technology

Google’s AI defenses built into Android now block 10 billion fraudulent messages per month

6 Min Read
New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs
Technology

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

3 Min Read
Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
Technology

Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks

6 Min Read
Iran-linked Muddy Water targets over 100 organizations in global espionage campaign
Technology

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?