Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps

Posted on December 23, 2025December 23, 2025 By CWS

A brand new model of MacSync Stealer malware is concentrating on macOS customers by means of digitally signed and notarized functions, marking a serious shift in how this menace is delivered.

In contrast to older variations that required customers to stick instructions into Terminal, this up to date variant operates silently within the background.

The malware comes disguised as a professional installer, distributed by means of a pretend web site below the identify zk-call-messenger-installer-3.9.2-lts.dmg.

As soon as put in, it downloads and runs a hidden script that steals delicate data from the sufferer’s pc.

The malware is packaged as a Swift software and signed with Apple’s Developer Workforce ID GNJLS3UYZ4, which permits it to bypass preliminary safety warnings that macOS often reveals for untrusted software program.

On the time researchers discovered it, Apple had not but revoked the certificates, which means the malware may set up with out triggering alerts. The disk picture file is unusually massive at 25.5MB as a result of it accommodates pretend PDF information associated to LibreOffice to make it look extra professional.

When uploaded to VirusTotal, some antivirus engines detected it as a generic downloader linked to cash or ooiid malware households.

Jamf analysts recognized this malware whereas checking their detection methods for uncommon exercise. They seen the malware didn’t comply with the standard patterns seen in earlier MacSync campaigns, which often relied on drag-to-terminal or ClickFix methods.

Obfuscated payload (Supply – Jamf)

This new method removes the necessity for consumer interplay with Terminal, making it a lot tougher for victims to understand they’re being attacked.

After confirming the menace, Jamf Risk Labs reported the malicious Developer Workforce ID to Apple, and the certificates has since been revoked.

Swift-Based mostly Execution and Payload Supply

The malware makes use of a Swift-built helper program referred to as runtimectl that handles your complete an infection course of. When this system begins, it checks if the pc has an web connection utilizing the checkInternet() perform.

Checking for web entry (Supply – Jamf)

If related, it proceeds to obtain the second-stage payload from hxxps://gatemaden[.]house/curl/985683bd660c0c47c6be513a2d1f0a554d52d241714bb17fb18ab0d0f8cc2dc6 utilizing a curl command.

The script is saved to /tmp/runner after which checked to ensure it’s a legitimate shell script by working /usr/bin/file –mime-type -b to verify it matches textual content/x-shellscript.

HTTP request (Supply – Jamf)

Earlier than working the payload, the malware removes the com.apple.quarantine flag utilizing removeQuarantine(at:) and units file permissions to 750 to make it executable.

It additionally creates log information at ~/Library/Logs/UserSyncWorker.log and monitoring information in ~/Library/Software Assist/UserSyncWorker/ to report exercise and forestall the malware from working too often.

A rate-limiting mechanism ensures the malware solely executes as soon as each 3600 seconds.

After the script runs, the /tmp/runner file is deleted to take away traces from the system, and the malware connects to focusgroovy[.]com to obtain further payloads and talk with its command-and-control server.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Apps, Attacking, Digitally, macOS, MacSync, Malware, Signed, Stealer, Users

Post navigation

Previous Post: PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution
Next Post: Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios

Related Posts

Infostealer Malware is Being Exploited by APT Groups for Targeted Attacks Cyber Security News
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor Cyber Security News
Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Cyber Security News
Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code Cyber Security News
Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure Cyber Security News
Jaguar Land Rover Confirms Hackers Stole Data in Ongoing Cyberattack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark