apple patient
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally
No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally
No Result
View All Result
apple patient
No Result
View All Result

macOS Gatekeeper bypassed via two-stage malware chain

by Milan
December 28, 2025
macOS Malware

Image: Shutterstock / Pungu x

Security features like Gatekeeper are among macOS's most important protection mechanisms. They are designed to prevent malware from running undetected and sensitive data from being leaked. However, a recent report shows that attackers have once again found ways to circumvent these safeguards. A new variant of the MacSync Stealer specifically exploits Apple's notarization process, thus achieving a new level of sophistication in attacks on macOS.

Gatekeeper has been considered an effective first line of defense against malware on macOS for years. In the past, attackers usually needed to trick users into taking action to circumvent this protection. This is precisely where the new attack method comes in. It reduces the necessary steps to a minimum and makes the infection process significantly less noticeable.

Gatekeeper and its previous role under macOS

Gatekeeper on macOS checks whether applications are signed and notarized by Apple. If this is not the case, execution is blocked or at least accompanied by clear warnings. Previous malware campaigns therefore attempted to trick users into deliberately bypassing these warnings. Typical methods included manually opening applications via the context menu or running scripts via the Terminal.

New findings from Jamf Threat Labs

Researchers at Jamf Threat Labs have reported on a new variant of the MacSync Stealer that takes a different approach. Instead of bypassing Gatekeeper, it abuses its trust. The malware is distributed via a code-signed and notarized Swift application. This means the app formally meets all the requirements to be launched on macOS without a warning message.

Camouflage as a legitimate application

The new variant is being distributed as an installer for a purported application called "zk-Call & Messenger." Users download this app via a web browser and can then open it normally with a double-click. Unlike previous versions, no right-click or explicit confirmation of opening is necessary, as it is a signed executable file.

An inspection of the installation file shows that it is correctly signed and notarized. It is also linked to a valid developer team ID. The file size of approximately 25.5 MB is noteworthy. The actual script is relatively small, but the application has been bloated with additional files such as PDFs. This makes it appear to be a legitimate installer simply due to its size.

The malware has a two-stage structure

The installation app does not directly contain the MacSync Stealer. After launching, it downloads a second payload from an external server. This server contains the actual malware, which is then installed on the target system. Technically, it is still an encrypted dropper. Many of the typical characteristics of MacSync Stealer are present.

The crucial difference lies in the first stage. By using a notarized and signed app, this stage can completely bypass Gatekeeper's protection mechanisms. The actual malware is only downloaded from the internet later.

Classification and previous developments

Jamf describes this case as an example of how malware authors are strategically refining their distribution methods to achieve as many infections as possible. According to the researchers, such a combination of a Swift-based, code-signed, and notarized application with a post-loaded payload has not been observed before.

The trend of embedding malware in seemingly legitimate executable files is not new. Back in 2020, it was revealed that malicious code had been able to bypass Apple's notarization process because harmful scripts within applications went undetected. What's new this time is that the notarized app itself doesn't contain any malicious code, but only retrieves it from the internet after passing all the necessary checks. This significantly complicates detection during the notarization process.

Reaction and current situation

Jamf reported the associated developer team ID to Apple. The affected certificate was subsequently revoked. However, at the time of publication of this report, the code directory hashes were not yet included in Apple's revocation list. This demonstrates that a window of time can still exist between discovery and complete revocation.

macOS security doesn't end with Gatekeeper

The MacSync Stealer case illustrates that despite Gatekeeper and notarization, macOS is not a completely closed system. Attackers deliberately exploit the trust built through signing and authentication. Therefore, meticulous digital hygiene remains crucial for Mac users. This includes carefully checking which software is installed and from which sources it originates, such as from well-known developer websites or directly from the Mac App Store. Gatekeeper is an important security mechanism in macOS, but it does not replace vigilance and critical behavior in everyday use. (Image: Shutterstock / Pungu x)

  • Apple Intelligence must pass China's AI censorship test
  • Ted Lasso Season 4: Producers announce possible release date
  • Apple allows alternative app stores on iOS in Brazil
  • iOS 26.3 receives praise from the EU for new features
  • WhatsApp is testing a new quiz feature for channels
  • Apple and China: Government-level meeting confirmed
  • Apple under pressure: Italy imposes millions in fines
  • Apple warns employees with visas against international travel
  • Data retention: Government wants to store IP addresses
  • Apple TV cancels "The Last Frontier" after one season
  • Apple showcases new AI research on smartphone photography
  • Apple indirectly forces iPhone users to update to iOS 26
  • Samsung is entering the 2nm era earlier with Exynos 2600
  • AirPods Pro 3: Background noise persists even after updates
  • ChatGPT extends the chat history with an important new function
  • Apple introduces UniGen 1.5: An AI model for all images
  • A macOS bug has caused Studio Display to flicker for months
  • Apple plans to increase advertising in App Store search starting in 2026
  • ChatGPT now supports Apple Music directly within the app
  • Apple opens App Store in Japan and changes iOS rules
  • Apple TV expands Monarch universe with new spin-off
  • Apple introduces SHARP: 3D scenes from just one photo
  • Apple stock: Morgan Stanley raises price target to $315
  • The Trump administration is threatening the EU with retaliation over DMA
Have you already visited our Amazon Storefront? There you'll find a hand-picked selection of various products for your iPhone and other devices – enjoy browsing !
This post contains affiliate links .
Add Apfelpatient to your Google News Feed. 
Was this article helpful?
YesNo
Tags: macOS
Previous Post

Apple launches major Mac offensive in 2026 with new chips

Next Post

Apple and the billion-dollar App Store ruling in the UK

Next Post
Apple UK

Apple and the billion-dollar App Store ruling in the UK

Apple Family Sharing

Use Apple's Family Sharing to share content together

December 28, 2025
Leave Apple Family Sharing

This is how to leave or change a Family Sharing

December 28, 2025
Apple Where is?

Find my: Everything you need to know about finding lost Apple devices

December 28, 2025

About APFELPATIENT

Welcome to your ultimate source for everything Apple - from the latest hardware like iPhone, iPad, Apple Watch, Mac, AirTags, HomePods, AirPods to the groundbreaking Apple Vision Pro and high-quality accessories. Dive deep into the world of Apple software with the latest updates and features for iOS, iPadOS, tvOS, watchOS, macOS and visionOS. In addition to comprehensive tips and tricks, we offer you the hottest rumors, the latest news and much more to keep you up to date. Selected gaming topics also find their place with us, always with a focus on how they enrich the Apple experience. Your interest in Apple and related technology is served here with plenty of expert knowledge and passion.

Legal

  • Imprint – About APFEPATIENT
  • Cookie Settings
  • Privacy Policy
  • Terms of Use

service

  • Partner Program
  • Netiquette – About APPLEPATIENT

RSS Feed

Follow Apfelpatient:
Facebook Instagram YouTube threads threads
Apfelpatient Logo

© 2025 Apfelpatient. All rights reserved. | Sitemap

No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally

© 2025 Apfelpatient. All rights reserved. | Page Directory

Change language to Deutsch