Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MacSync macOS Malware Distributed via Signed Swift Application

MacSync macOS Malware Distributed via Signed Swift Application

Posted on December 22, 2025December 22, 2025 By CWS

The builders of a macOS malware named MacSync Stealer have up to date their supply mechanism, eliminating the necessity for direct terminal interplay, Jamf studies.

The MacSync Stealer emerged roughly half a yr in the past, as a rebrand of Mac.c, a macOS data stealer that was first seen in April 2025.

Mac.c was an affordable various to established macOS stealers, and was acquired by a malware developer who shortly expanded its capabilities and turned it right into a distinguished menace.

Along with the information-stealing capabilities inherited from Mac.c, MacSync Stealer was retrofitted with backdoor capabilities by way of a fully-featured Go-based agent.

Much like most macOS infostealers, it relied on social engineering methods, resembling ClickFix, to trick customers into executing malicious scripts, resulting in an infection.

A lately noticed pattern, nonetheless, eliminates this step, taking a extra direct, hands-off strategy, Jamf says.

The stealer’s operators packed the malware’s dropper as a code-signed and notarized Swift utility inside a disk picture masquerading as a zk-Name messenger installer.

“The dropper retrieves an encoded script from a distant server and executes it by way of a Swift-built helper executable,” Jamf explains.Commercial. Scroll to proceed studying.

The identical distribution method, the cybersecurity agency notes, has been adopted by the Odyssey infostealer household as effectively.

Evaluation of MacSync Stealer’s new an infection chain revealed a layered, evasive dropper routine targeted on stealth and persistence, which incorporates environmental checks, community requests, Gatekeeper evasion, and validation.

MacSync Stealer began showing in detections in mid-2025, however contaminated a whole lot of machines comparatively quick.

“This shift in distribution displays a broader pattern throughout the macOS malware panorama, the place attackers more and more try and sneak their malware into executables which are signed and notarized, permitting them to look extra like reliable purposes,” Jamf notes.

Associated: ClickFix Assaults Towards macOS Customers Evolving

Associated: Apple Updates iOS and macOS to Forestall Malicious Font Assaults

Associated: New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

Associated: Widespread Infostealer Marketing campaign Focusing on macOS Customers

Security Week News Tags:Application, Distributed, macOS, MacSync, Malware, Signed, Swift

Post navigation

Previous Post: New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs
Next Post: Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Related Posts

Upwind Raises 0 Million at .5 Billion Valuation Upwind Raises $250 Million at $1.5 Billion Valuation Security Week News
Echo Raises M in Seed Funding for Vulnerability-Free Container Images Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images Security Week News
Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Security Week News
Plex Urges Password Resets Following Data Breach Plex Urges Password Resets Following Data Breach Security Week News
1.2 Million Impacted by WestJet Data Breach 1.2 Million Impacted by WestJet Data Breach Security Week News
James Bishop Appointed Pentagon’s New Cybersecurity Chief James Bishop Appointed Pentagon’s New Cybersecurity Chief Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark