Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps

New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps

Posted on December 23, 2025December 23, 2025 By CWS

A brand new model of MacSync Stealer malware is concentrating on macOS customers by means of digitally signed and notarized functions, marking a serious shift in how this menace is delivered.

In contrast to older variations that required customers to stick instructions into Terminal, this up to date variant operates silently within the background.

The malware comes disguised as a professional installer, distributed by means of a pretend web site below the identify zk-call-messenger-installer-3.9.2-lts.dmg.

As soon as put in, it downloads and runs a hidden script that steals delicate data from the sufferer’s pc.

The malware is packaged as a Swift software and signed with Apple’s Developer Workforce ID GNJLS3UYZ4, which permits it to bypass preliminary safety warnings that macOS often reveals for untrusted software program.

On the time researchers discovered it, Apple had not but revoked the certificates, which means the malware may set up with out triggering alerts. The disk picture file is unusually massive at 25.5MB as a result of it accommodates pretend PDF information associated to LibreOffice to make it look extra professional.

When uploaded to VirusTotal, some antivirus engines detected it as a generic downloader linked to cash or ooiid malware households.

Jamf analysts recognized this malware whereas checking their detection methods for uncommon exercise. They seen the malware didn’t comply with the standard patterns seen in earlier MacSync campaigns, which often relied on drag-to-terminal or ClickFix methods.

Obfuscated payload (Supply – Jamf)

This new method removes the necessity for consumer interplay with Terminal, making it a lot tougher for victims to understand they’re being attacked.

After confirming the menace, Jamf Risk Labs reported the malicious Developer Workforce ID to Apple, and the certificates has since been revoked.

Swift-Based mostly Execution and Payload Supply

The malware makes use of a Swift-built helper program referred to as runtimectl that handles your complete an infection course of. When this system begins, it checks if the pc has an web connection utilizing the checkInternet() perform.

Checking for web entry (Supply – Jamf)

If related, it proceeds to obtain the second-stage payload from hxxps://gatemaden[.]house/curl/985683bd660c0c47c6be513a2d1f0a554d52d241714bb17fb18ab0d0f8cc2dc6 utilizing a curl command.

The script is saved to /tmp/runner after which checked to ensure it’s a legitimate shell script by working /usr/bin/file –mime-type -b to verify it matches textual content/x-shellscript.

HTTP request (Supply – Jamf)

Earlier than working the payload, the malware removes the com.apple.quarantine flag utilizing removeQuarantine(at:) and units file permissions to 750 to make it executable.

It additionally creates log information at ~/Library/Logs/UserSyncWorker.log and monitoring information in ~/Library/Software Assist/UserSyncWorker/ to report exercise and forestall the malware from working too often.

A rate-limiting mechanism ensures the malware solely executes as soon as each 3600 seconds.

After the script runs, the /tmp/runner file is deleted to take away traces from the system, and the malware connects to focusgroovy[.]com to obtain further payloads and talk with its command-and-control server.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Apps, Attacking, Digitally, macOS, MacSync, Malware, Signed, Stealer, Users

Post navigation

Previous Post: PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution
Next Post: Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios

Related Posts

Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Cyber Security News
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Cyber Security News
India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones Cyber Security News
PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution Cyber Security News
Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts Cyber Security News
MioLab Infostealer: Advanced Threat to macOS Users MioLab Infostealer: Advanced Threat to macOS Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark