By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
Computing

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

News Room
Last updated: 2025/12/24 at 12:28 PM
News Room Published 24 December 2025
Share
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
SHARE

Dec 24, 2025Ravie LakshmananMalware / Endpoint Security

Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that’s delivered by means of a digitally signed, notarized Swift application masquerading as a messaging app installer to bypass Apple’s Gatekeeper checks.

“Unlike earlier MacSync Stealer variants that primarily rely on drag-to-terminal or ClickFix-style techniques, this sample adopts a more deceptive, hands-off approach,” Jamf researcher Thijs Xhaflaire said.

The Apple device management firm and security company said the latest version is distributed as a code-signed and notarized Swift application within a disk image (DMG) file named “zk-call-messenger-installer-3.9.2-lts.dmg” that’s hosted on “zkcall[.]net/download.”

Cybersecurity

The fact that it’s signed and notarized means it can be run without being blocked or flagged by built-in security controls like Gatekeeper or XProtect. Despite this, the installer has been found to display instructions prompting users to right-click and open the app – a common tactic used to sidestep such safeguards. Apple has since revoked the code signing certificate.

The Swift-based dropper then performs a series of checks before downloading and executing an encoded script through a helper component. This includes verifying internet connectivity, enforcing a minimum execution interval of around 3600 seconds to enforce a rate limit, and removing quarantine attributes and validating the file prior to execution.

“Notably, the curl command used to retrieve the payload shows clear deviations from earlier variants,” Xhaflaire explained. “Rather than using the commonly seen -fsSL combination, the flags have been split into -fL and -sS, and additional options like –noproxy have been introduced.”

“These changes, along with the use of dynamically populated variables, point to a deliberate shift in how the payload is fetched and validated, likely aimed at improving reliability or evading detection.”

Another evasion mechanism used in the campaign is the use of an unusually large DMG file, inflating its size to 25.5 MB by embedding unrelated PDF documents.

The Base64-encoded payload, once parsed, corresponds to MacSync, a rebranded version of Mac.c that first emerged in April 2025. MacSync, per MacPaw’s Moonlock Lab, comes fitted with a fully-featured Go-based agent that goes beyond simple data theft and enables remote command and control capabilities.

Cybersecurity

It’s worth noting that code-signed versions of malicious DMG files mimicking Google Meet have also been observed in attacks propagating other macOS stealers like Odyssey. That said, threat actors have continued to rely on unsigned disk images to deliver DigitStealer as recently as last month.

“This shift in distribution reflects a broader trend across the macOS malware landscape, where attackers increasingly attempt to sneak their malware into executables that are signed and notarized, allowing them to look more like legitimate applications,” Jamf said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Streaming device deal: Save  on the Amazon Fire TV Stick 4K Max Streaming device deal: Save $20 on the Amazon Fire TV Stick 4K Max
Next Article Lenovo Legion Pro 5 Gen 10 Review: OLED Glamour, Midrange Gaming Grit Lenovo Legion Pro 5 Gen 10 Review: OLED Glamour, Midrange Gaming Grit
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How to Get More Instagram Followers in 2025 (25 Proven Tips)
How to Get More Instagram Followers in 2025 (25 Proven Tips)
Computing
Top 10 AI stories of 2025 | Computer Weekly
Top 10 AI stories of 2025 | Computer Weekly
News
Google One’s AI Pro Plan With 2TB Storage Is Now Over 50% Off
Google One’s AI Pro Plan With 2TB Storage Is Now Over 50% Off
News
30 Fast AI Income Ideas You Can Launch This Weekend | HackerNoon
30 Fast AI Income Ideas You Can Launch This Weekend | HackerNoon
Computing

You Might also Like

How to Get More Instagram Followers in 2025 (25 Proven Tips)
Computing

How to Get More Instagram Followers in 2025 (25 Proven Tips)

21 Min Read
30 Fast AI Income Ideas You Can Launch This Weekend | HackerNoon
Computing

30 Fast AI Income Ideas You Can Launch This Weekend | HackerNoon

10 Min Read
How to Set Social Media Goals in 2025 (+ Free Course)
Computing

How to Set Social Media Goals in 2025 (+ Free Course)

1 Min Read
This One Script Fixed the “Images Drop In Late” Problem | HackerNoon
Computing

This One Script Fixed the “Images Drop In Late” Problem | HackerNoon

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?