Swiftly Notarized Nuisance: MacSync Malware Makes a Comeback on macOS Systems

The latest MacSync information stealer variant is targeting macOS systems with a cunning twist: it’s disguised as a notarized Swift app. Just when you thought “drag-to-Terminal” was passé, this sneaky malware bypasses checks and swipes data while pretending to be a legitimate app. Even malware is getting fancier these days!

Pro Dashboard

Hot Take:

Well, it looks like the MacSync information stealer is finally growing up and getting a job. It figured out that hanging around in the shady alleys of drag-to-Terminal operations just wasn’t cutting it anymore, so it put on a suit, got itself notarized, and is now slipping through macOS security checks with a fancy Swift application. If only it realized that a life of digital crime doesn’t have a 401(k) plan.

Key Points:

– MacSync information stealer is now delivered via a digitally signed and notarized Swift application.
– The malware’s new delivery method bypasses macOS Gatekeeper security checks.
– Researchers identified evasion tactics like embedding decoy PDFs and wiping execution scripts.
– The MacSync stealer can pilfer iCloud keychain credentials, browser passwords, and more.
– Apple has revoked the certificate after being alerted by security researchers.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?