The Growing Concern of Apple-Notarized Malware on macOS

The Growing Concern of Apple-Notarized Malware on macOS

The Growing Concern of Apple-Notarized Malware on macOS


### The Emergence of MacSync Stealer: An Escalating Danger to macOS Security

Recent findings from Jamf Threat Labs have brought to light a troubling development in macOS security, with a focus on a new iteration of the MacSync Stealer malware. This version has successfully circumvented Apple’s stringent third-party application safeguards, prompting concerns regarding the efficacy of existing security protocols.

#### Grasping the Danger

The MacSync Stealer malware family has become infamous for its capacity to penetrate macOS systems while masquerading as legitimate software. The most recent variant was spread through a harmful application that was both code-signed with a legitimate Developer ID and had received notarization from Apple. As a result, Apple’s Gatekeeper, designed to block unverified applications, had no basis for stopping the app from executing.

Traditionally, Apple’s security framework has depended on cryptographic signing and notarization to confirm that applications distributed outside the Mac App Store are secure. Nonetheless, this framework operates on the premise that a signed application is trustworthy. Regrettably, malicious actors have discovered ways to exploit this trust by acquiring valid developer certificates, enabling them to distribute malware that appears indistinguishable from authentic software during installation.

#### Tactics Employed by Attackers

The strategies utilized by threat actors to disseminate this malware are becoming increasingly advanced. A number of attackers utilize compromised or acquired Developer ID certificates from illicit channels, which significantly diminishes the chances of detection. The initial binary of the malware typically comprises a straightforward Swift-based executable that passes Apple’s static analysis assessments and looks harmless.

The genuine malicious actions transpire later, when the application connects to external servers to fetch additional payloads. Should these payloads be absent during the notarization stage, Apple’s security scanners lack the capability to scrutinize them, enabling the malware to evade identification. This design flaw in the notarization procedure, which assesses only what is present at the time of submission, has turned into a critical vulnerability that attackers are taking advantage of.

#### Context and Future Consequences

The first recorded instance of Apple-notarized malware dates back to 2020, with further discoveries reinforcing the ongoing trend. While some might contend that the issue has reached a pivotal stage, it is crucial to acknowledge that the system is performing as designed. Code signing and notarization were never intended to ensure constant safety; they simply create a traceable connection to a legitimate developer, allowing for revocation when misuse is detected.

As we approach 2026, this attack vector is likely to keep evolving, requiring continuous vigilance and adjustments in security practices.

#### Recommendations for Users

To lessen the dangers linked with malware, users are encouraged to download software solely from trusted developers or the Mac App Store. By following these recommendations, users can substantially lower their risk of encountering harmful applications.

In summary, the rise of variants like the MacSync Stealer emphasizes the necessity for ongoing enhancement of security measures and user vigilance. As the threat landscape changes, so too must our defenses in response.