Sneaky MacOS Malware: How the New MacSync Stealer Plays Hide-and-Seek with Your System
A new macOS malware disguises itself as a legitimate app, bypassing Gatekeeper warnings. This revamped MacSync Stealer sneaks onto systems with an automated installation, fooling users with its notarized exterior. Discovered by Jamf Threat Labs, its clever tactics highlight evolving methods in the macOS malware landscape.

Hot Take:
Alright Apple fans, it seems your beloved macOS isn’t immune to the occasional digital Trojan horse. In today’s episode of ‘What the Malware?’, a re-imagined MacSync Stealer has taken a page from the book of ‘How to be a Sneaky App’ and is giving us a masterclass on how to masquerade as legit. If only it used its powers for good instead of evil. But alas, here we are, with malware so suave, even James Bond would be impressed!
Key Points:
- The new malware disguises itself as a signed and notarized Swift application.
- Distributed via a disk image pretending to be a messaging app installer.
- Employs a stealthy, automated installation process with minimal user interaction.
- Utilizes a remote server to fetch and execute an encoded script.
- Apple revoked the fraudulent developer certificate post-detection.
