Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacSync macOS Malware Distributed via Signed Swift Application

MacSync macOS Malware Distributed via Signed Swift Application

Posted on December 22, 2025December 22, 2025 By CWS

The builders of a macOS malware named MacSync Stealer have up to date their supply mechanism, eliminating the necessity for direct terminal interplay, Jamf studies.

The MacSync Stealer emerged roughly half a yr in the past, as a rebrand of Mac.c, a macOS data stealer that was first seen in April 2025.

Mac.c was an affordable various to established macOS stealers, and was acquired by a malware developer who shortly expanded its capabilities and turned it right into a distinguished menace.

Along with the information-stealing capabilities inherited from Mac.c, MacSync Stealer was retrofitted with backdoor capabilities by way of a fully-featured Go-based agent.

Much like most macOS infostealers, it relied on social engineering methods, resembling ClickFix, to trick customers into executing malicious scripts, resulting in an infection.

A lately noticed pattern, nonetheless, eliminates this step, taking a extra direct, hands-off strategy, Jamf says.

The stealer’s operators packed the malware’s dropper as a code-signed and notarized Swift utility inside a disk picture masquerading as a zk-Name messenger installer.

“The dropper retrieves an encoded script from a distant server and executes it by way of a Swift-built helper executable,” Jamf explains.Commercial. Scroll to proceed studying.

The identical distribution method, the cybersecurity agency notes, has been adopted by the Odyssey infostealer household as effectively.

Evaluation of MacSync Stealer’s new an infection chain revealed a layered, evasive dropper routine targeted on stealth and persistence, which incorporates environmental checks, community requests, Gatekeeper evasion, and validation.

MacSync Stealer began showing in detections in mid-2025, however contaminated a whole lot of machines comparatively quick.

“This shift in distribution displays a broader pattern throughout the macOS malware panorama, the place attackers more and more try and sneak their malware into executables which are signed and notarized, permitting them to look extra like reliable purposes,” Jamf notes.

Associated: ClickFix Assaults Towards macOS Customers Evolving

Associated: Apple Updates iOS and macOS to Forestall Malicious Font Assaults

Associated: New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

Associated: Widespread Infostealer Marketing campaign Focusing on macOS Customers

Security Week News Tags:Application, Distributed, macOS, MacSync, Malware, Signed, Swift

Post navigation

Previous Post: New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs
Next Post: Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Related Posts

US Targets North Korea’s Illicit Funds: M Rewards Offered as American Woman Jailed in IT Worker Scam US Targets North Korea’s Illicit Funds: $15M Rewards Offered as American Woman Jailed in IT Worker Scam Security Week News
Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited Security Week News
Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT Security Week News
Hackers Exploit Zero-Day in Discontinued D-Link Devices Hackers Exploit Zero-Day in Discontinued D-Link Devices Security Week News
Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw Security Week News
Cisco Patches Vulnerability Exploited by Chinese Hackers Cisco Patches Vulnerability Exploited by Chinese Hackers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark