Sneaky MacOS Malware: How the New MacSync Stealer Plays Hide-and-Seek with Your System

A new macOS malware disguises itself as a legitimate app, bypassing Gatekeeper warnings. This revamped MacSync Stealer sneaks onto systems with an automated installation, fooling users with its notarized exterior. Discovered by Jamf Threat Labs, its clever tactics highlight evolving methods in the macOS malware landscape.

Pro Dashboard

Hot Take:

Alright Apple fans, it seems your beloved macOS isn’t immune to the occasional digital Trojan horse. In today’s episode of ‘What the Malware?’, a re-imagined MacSync Stealer has taken a page from the book of ‘How to be a Sneaky App’ and is giving us a masterclass on how to masquerade as legit. If only it used its powers for good instead of evil. But alas, here we are, with malware so suave, even James Bond would be impressed!

Key Points:

  • The new malware disguises itself as a signed and notarized Swift application.
  • Distributed via a disk image pretending to be a messaging app installer.
  • Employs a stealthy, automated installation process with minimal user interaction.
  • Utilizes a remote server to fetch and execute an encoded script.
  • Apple revoked the fraudulent developer certificate post-detection.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?