New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
Briefly

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
"Unlike earlier MacSync Stealer variants that primarily rely on drag-to-terminal or ClickFix-style techniques, this sample adopts a more deceptive, hands-off approach, Jamf researcher Thijs Xhaflaire said."
"Notably, the curl command used to retrieve the payload shows clear deviations from earlier variants, Xhaflaire explained."
"Rather than using the commonly seen -fsSL combination, the flags have been split into -fL and -sS, and additional options like --noproxy have been introduced."
"These changes, along with the use of dynamically populated variables, point to a deliberate shift in how the payload is fetched and validated, likely aimed at improving reliability or evading detection."
A new MacSync information stealer variant is distributed as a code-signed, notarized Swift application inside a disk image named zk-call-messenger-installer-3.9.2-lts.dmg hosted on zkcall[.]net/download. The signing and notarization allow the installer to run without Gatekeeper or XProtect blocking, while on-screen instructions prompt users to right-click and open the app to further bypass protections. Apple revoked the signing certificate. The Swift dropper verifies internet connectivity, enforces a roughly 3,600-second execution interval, removes quarantine attributes, validates files, and downloads an encoded script through a helper. The payload fetch uses altered curl flags (-fL and -sS, --noproxy) and dynamic variables to improve reliability or evade detection.
Read at The Hacker News
Unable to calculate read time
[
|
]