MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Related

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Victorian Department of Education Breach Exposes Student Account Data

What happened A Victorian Department of Education breach exposes student...

Malware Campaign Using Fake Charities Targets Ukraine’s Defense Forces

What happened A malware campaign using fake charities targets Ukraine’s...

Windows Secure Boot Certificates Near Expiration, Risking Boot Failures Without Updates

What happened Windows Secure Boot certificates near expiration, risking boot...

Share

What happened

MacSync Stealer uses signed macOS app to evade Gatekeeper and steal data after security researchers at Jamf Threat Labs discovered a new variant of the MacSync information-stealing malware that is distributed as a legitimately code-signed and notarized Swift application to bypass Apple macOS Gatekeeper protections. Unlike earlier variants that relied on complex manual techniques, this version arrives as a signed, notarized disk image masquerading as a trusted application, enabling it to evade warnings about unidentified developers. The stealer can install backdoors for persistent access, harvest stored credentials and browser data, and target cryptocurrency wallet information. Attackers obtain legitimate developer certificates through theft, compromised accounts, or fraudulent identities to make the malware appear authentic, and a command-and-control server, including focusgroovy[.]com, is used to fetch additional payloads. 

Who is affected

macOS users and organizations with Apple device fleets are at risk of data theft and persistent compromise if the malicious software is installed, especially through deceptive distribution channels.

Why CISOs should care

Signed malware that bypasses platform security controls like Gatekeeper can undermine endpoint defenses, highlighting the need for enhanced application control, code integrity verification, and robust monitoring of macOS environments.

3 practical actions

  • Harden application control: Enforce strict policies that block or scrutinize unsigned and unfamiliar signed applications.
  • Enhance endpoint monitoring: Deploy detection for anomalous or persistent processes linked to unauthorized app installations.
  • Audit developer certificates: Track and revoke suspicious or unused code-signing certificates in enterprise environments.