Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MacSync macOS Malware Distributed via Signed Swift Application

Posted on December 22, 2025December 22, 2025 By CWS

The builders of a macOS malware named MacSync Stealer have up to date their supply mechanism, eliminating the necessity for direct terminal interplay, Jamf studies.

The MacSync Stealer emerged roughly half a yr in the past, as a rebrand of Mac.c, a macOS data stealer that was first seen in April 2025.

Mac.c was an affordable various to established macOS stealers, and was acquired by a malware developer who shortly expanded its capabilities and turned it right into a distinguished menace.

Along with the information-stealing capabilities inherited from Mac.c, MacSync Stealer was retrofitted with backdoor capabilities by way of a fully-featured Go-based agent.

Much like most macOS infostealers, it relied on social engineering methods, resembling ClickFix, to trick customers into executing malicious scripts, resulting in an infection.

A lately noticed pattern, nonetheless, eliminates this step, taking a extra direct, hands-off strategy, Jamf says.

The stealer’s operators packed the malware’s dropper as a code-signed and notarized Swift utility inside a disk picture masquerading as a zk-Name messenger installer.

“The dropper retrieves an encoded script from a distant server and executes it by way of a Swift-built helper executable,” Jamf explains.Commercial. Scroll to proceed studying.

The identical distribution method, the cybersecurity agency notes, has been adopted by the Odyssey infostealer household as effectively.

Evaluation of MacSync Stealer’s new an infection chain revealed a layered, evasive dropper routine targeted on stealth and persistence, which incorporates environmental checks, community requests, Gatekeeper evasion, and validation.

MacSync Stealer began showing in detections in mid-2025, however contaminated a whole lot of machines comparatively quick.

“This shift in distribution displays a broader pattern throughout the macOS malware panorama, the place attackers more and more try and sneak their malware into executables which are signed and notarized, permitting them to look extra like reliable purposes,” Jamf notes.

Associated: ClickFix Assaults Towards macOS Customers Evolving

Associated: Apple Updates iOS and macOS to Forestall Malicious Font Assaults

Associated: New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

Associated: Widespread Infostealer Marketing campaign Focusing on macOS Customers

Security Week News Tags:Application, Distributed, macOS, MacSync, Malware, Signed, Swift

Post navigation

Previous Post: New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs
Next Post: Docker Open Sources Production-Ready Hardened Images for Free

Related Posts

ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails Security Week News
Filigran Raises $58 Million in Series C Funding Security Week News
Microsoft Patches Actively Exploited Windows Kernel Zero-Day Security Week News
Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests  Security Week News
Adobe Patches Nearly 140 Vulnerabilities Security Week News
NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator
  • Sleeping Bouncer Vulnerability Impacts Motherboards from Gigabyte, MSI, ASRock and ASUS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator
  • Sleeping Bouncer Vulnerability Impacts Motherboards from Gigabyte, MSI, ASRock and ASUS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark