Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

Posted on December 24, 2025December 24, 2025 By CWS

Dec 24, 2025Ravie LakshmananMalware / Endpoint Safety
Cybersecurity researchers have found a brand new variant of a macOS info stealer referred to as MacSync that is delivered by way of a digitally signed, notarized Swift utility masquerading as a messaging app installer to bypass Apple’s Gatekeeper checks.
“In contrast to earlier MacSync Stealer variants that primarily depend on drag-to-terminal or ClickFix-style strategies, this pattern adopts a extra misleading, hands-off method,” Jamf researcher Thijs Xhaflaire mentioned.
The Apple machine administration agency and safety firm mentioned the newest model is distributed as a code-signed and notarized Swift utility inside a disk picture (DMG) file named “zk-call-messenger-installer-3.9.2-lts.dmg” that is hosted on “zkcall[.]internet/obtain.”

The truth that it is signed and notarized means it may be run with out being blocked or flagged by built-in safety controls like Gatekeeper or XProtect. Regardless of this, the installer has been discovered to show directions prompting customers to right-click and open the app – a typical tactic used to sidestep such safeguards. Apple has since revoked the code signing certificates.
The Swift-based dropper then performs a collection of checks earlier than downloading and executing an encoded script by a helper element. This contains verifying web connectivity, imposing a minimal execution interval of round 3600 seconds to implement a charge restrict, and eradicating quarantine attributes and validating the file previous to execution.
“Notably, the curl command used to retrieve the payload reveals clear deviations from earlier variants,” Xhaflaire defined. “Fairly than utilizing the generally seen -fsSL mixture, the flags have been break up into -fL and -sS, and extra choices like –noproxy have been launched.”

“These modifications, together with using dynamically populated variables, level to a deliberate shift in how the payload is fetched and validated, possible geared toward enhancing reliability or evading detection.”
One other evasion mechanism used within the marketing campaign is using an unusually giant DMG file, inflating its measurement to 25.5 MB by embedding unrelated PDF paperwork.
The Base64-encoded payload, as soon as parsed, corresponds to MacSync, a rebranded model of Mac.c that first emerged in April 2025. MacSync, per MacPaw’s Moonlock Lab, comes fitted with a fully-featured Go-based agent that goes past easy knowledge theft and permits distant command and management capabilities.

It is value noting that code-signed variations of malicious DMG recordsdata mimicking Google Meet have additionally been noticed in assaults propagating different macOS stealers like Odyssey. That mentioned, risk actors have continued to depend on unsigned disk photos to ship DigitStealer as just lately as final month.
“This shift in distribution displays a broader pattern throughout the macOS malware panorama, the place attackers more and more try and sneak their malware into executables which are signed and notarized, permitting them to look extra like professional purposes,” Jamf mentioned.

The Hacker News Tags:App, Apple, Bypass, Gatekeeper, macOS, MacSync, Signed, Stealer

Post navigation

Previous Post: Pro-Russian Hackers Claim Cyberattack on French Postal Service
Next Post: Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security

Related Posts

Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC The Hacker News
Continuous Threat Exposure Management: A Critical Security Solution Continuous Threat Exposure Management: A Critical Security Solution The Hacker News
Identity Security Has an Automation Problem—And It’s Bigger Than You Think Identity Security Has an Automation Problem—And It’s Bigger Than You Think The Hacker News
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options The Hacker News
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers The Hacker News
Botnet Uses Polygon Blockchain for Resilient Command Control Botnet Uses Polygon Blockchain for Resilient Command Control The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark