Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps

New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps

Posted on December 23, 2025December 23, 2025 By CWS

A brand new model of MacSync Stealer malware is concentrating on macOS customers by means of digitally signed and notarized functions, marking a serious shift in how this menace is delivered.

In contrast to older variations that required customers to stick instructions into Terminal, this up to date variant operates silently within the background.

The malware comes disguised as a professional installer, distributed by means of a pretend web site below the identify zk-call-messenger-installer-3.9.2-lts.dmg.

As soon as put in, it downloads and runs a hidden script that steals delicate data from the sufferer’s pc.

The malware is packaged as a Swift software and signed with Apple’s Developer Workforce ID GNJLS3UYZ4, which permits it to bypass preliminary safety warnings that macOS often reveals for untrusted software program.

On the time researchers discovered it, Apple had not but revoked the certificates, which means the malware may set up with out triggering alerts. The disk picture file is unusually massive at 25.5MB as a result of it accommodates pretend PDF information associated to LibreOffice to make it look extra professional.

When uploaded to VirusTotal, some antivirus engines detected it as a generic downloader linked to cash or ooiid malware households.

Jamf analysts recognized this malware whereas checking their detection methods for uncommon exercise. They seen the malware didn’t comply with the standard patterns seen in earlier MacSync campaigns, which often relied on drag-to-terminal or ClickFix methods.

Obfuscated payload (Supply – Jamf)

This new method removes the necessity for consumer interplay with Terminal, making it a lot tougher for victims to understand they’re being attacked.

After confirming the menace, Jamf Risk Labs reported the malicious Developer Workforce ID to Apple, and the certificates has since been revoked.

Swift-Based mostly Execution and Payload Supply

The malware makes use of a Swift-built helper program referred to as runtimectl that handles your complete an infection course of. When this system begins, it checks if the pc has an web connection utilizing the checkInternet() perform.

Checking for web entry (Supply – Jamf)

If related, it proceeds to obtain the second-stage payload from hxxps://gatemaden[.]house/curl/985683bd660c0c47c6be513a2d1f0a554d52d241714bb17fb18ab0d0f8cc2dc6 utilizing a curl command.

The script is saved to /tmp/runner after which checked to ensure it’s a legitimate shell script by working /usr/bin/file –mime-type -b to verify it matches textual content/x-shellscript.

HTTP request (Supply – Jamf)

Earlier than working the payload, the malware removes the com.apple.quarantine flag utilizing removeQuarantine(at:) and units file permissions to 750 to make it executable.

It additionally creates log information at ~/Library/Logs/UserSyncWorker.log and monitoring information in ~/Library/Software Assist/UserSyncWorker/ to report exercise and forestall the malware from working too often.

A rate-limiting mechanism ensures the malware solely executes as soon as each 3600 seconds.

After the script runs, the /tmp/runner file is deleted to take away traces from the system, and the malware connects to focusgroovy[.]com to obtain further payloads and talk with its command-and-control server.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Apps, Attacking, Digitally, macOS, MacSync, Malware, Signed, Stealer, Users

Post navigation

Previous Post: PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution
Next Post: Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios

Related Posts

Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cyber Security News
CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation Cyber Security News
RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases Cyber Security News
Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Cyber Security News
Building a Cyber-Resilient Organization CISOs Roadmap Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News
Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News