Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacSync macOS Malware Distributed via Signed Swift Application

MacSync macOS Malware Distributed via Signed Swift Application

Posted on December 22, 2025December 22, 2025 By CWS

The builders of a macOS malware named MacSync Stealer have up to date their supply mechanism, eliminating the necessity for direct terminal interplay, Jamf studies.

The MacSync Stealer emerged roughly half a yr in the past, as a rebrand of Mac.c, a macOS data stealer that was first seen in April 2025.

Mac.c was an affordable various to established macOS stealers, and was acquired by a malware developer who shortly expanded its capabilities and turned it right into a distinguished menace.

Along with the information-stealing capabilities inherited from Mac.c, MacSync Stealer was retrofitted with backdoor capabilities by way of a fully-featured Go-based agent.

Much like most macOS infostealers, it relied on social engineering methods, resembling ClickFix, to trick customers into executing malicious scripts, resulting in an infection.

A lately noticed pattern, nonetheless, eliminates this step, taking a extra direct, hands-off strategy, Jamf says.

The stealer’s operators packed the malware’s dropper as a code-signed and notarized Swift utility inside a disk picture masquerading as a zk-Name messenger installer.

“The dropper retrieves an encoded script from a distant server and executes it by way of a Swift-built helper executable,” Jamf explains.Commercial. Scroll to proceed studying.

The identical distribution method, the cybersecurity agency notes, has been adopted by the Odyssey infostealer household as effectively.

Evaluation of MacSync Stealer’s new an infection chain revealed a layered, evasive dropper routine targeted on stealth and persistence, which incorporates environmental checks, community requests, Gatekeeper evasion, and validation.

MacSync Stealer began showing in detections in mid-2025, however contaminated a whole lot of machines comparatively quick.

“This shift in distribution displays a broader pattern throughout the macOS malware panorama, the place attackers more and more try and sneak their malware into executables which are signed and notarized, permitting them to look extra like reliable purposes,” Jamf notes.

Associated: ClickFix Assaults Towards macOS Customers Evolving

Associated: Apple Updates iOS and macOS to Forestall Malicious Font Assaults

Associated: New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

Associated: Widespread Infostealer Marketing campaign Focusing on macOS Customers

Security Week News Tags:Application, Distributed, macOS, MacSync, Malware, Signed, Swift

Post navigation

Previous Post: New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs
Next Post: Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Related Posts

Cisco Says User Data Stolen in CRM Hack Cisco Says User Data Stolen in CRM Hack Security Week News
NASCAR Confirms Personal Information Stolen in Ransomware Attack NASCAR Confirms Personal Information Stolen in Ransomware Attack Security Week News
Gambit Cyber Raises .4 Million in Seed Funding Gambit Cyber Raises $3.4 Million in Seed Funding Security Week News
China’s Salt Typhoon Hackers Target Canadian Telecom Firms China’s Salt Typhoon Hackers Target Canadian Telecom Firms Security Week News
Radical Empowerment From Your Leadership: Understood by Few, Essential for All Radical Empowerment From Your Leadership: Understood by Few, Essential for All Security Week News
Horizon3.ai Raises 0 Million in Series D Funding Horizon3.ai Raises $100 Million in Series D Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News