macOS Trojan Upgrades: Spreading through Signed App, Encrypting Users Face More Covert Risk

By: theblockbeats.news|2025/12/23 14:46:05
0
Share
copy

BlockBeats News, December 23, SlowMist Chief Security Officer 23pds shared a post stating that the MacSync Stealer malware active on the macOS platform has undergone significant evolution, with user assets already being stolen. The article shared by him mentioned that from earlier reliance on "drag-and-drop to Terminal" and "ClickFix" and other low-threshold inducement methods, it has upgraded to code signing and through Apple notarized Swift applications, significantly improving its stealthiness.

Researchers found that this sample is being spread in the form of a disk image named zk-call-messenger-installer-3.9.2-lts.dmg, disguised as instant messaging or utility applications to induce users to download. Unlike before, the new version no longer requires any terminal operation by the user but is pulled and executed by a built-in Swift helper from a remote server to complete the information theft process.

This malware has been code signed and notarized by Apple, with the developer team ID being GNJLS3UYZ4, and the related hash has not been revoked by Apple during analysis. This means that it has a higher "trust level" under macOS's default security mechanisms, making it easier to bypass user vigilance. Research also found that the DMG file is unusually large, containing decoy files related to LibreOffice PDFs, among others, to further reduce suspicion.

Security researchers pointed out that such information-stealing trojans often target browser data, account credentials, and cryptocurrency wallet information. As malware begins to systematically abuse Apple's signing and notarization mechanism, cryptocurrency users in the macOS environment are facing an increasing risk of phishing and private key leaks.

Users are strongly advised to ensure that threat prevention and advanced threat control are enabled in Jamf for Mac and set to blocking mode to defend against these latest variants of information-stealing malware.

You may also like

Stop Talking About Gold, Bitcoin Is Not a Safe Haven Asset

One cannot rely on macro narratives like "Gold Rotation" to determine whether Bitcoin has bottomed. True bottom signals will only appear during position unwinding and extreme pessimistic sentiment.

Aave Founder: What Is the Secret of the DeFi Lending Market?

When on-chain lending becomes significantly cheaper to operate end-to-end compared to traditional lending, mass adoption becomes not a question of if, but of when.

The Trader's Playbook: 7 Market Cycle Lessons From LALIGA’s 90 Minutes

What do LALIGA matches teach about crypto markets? Learn how consolidation, breakouts, and late-cycle volatility shape disciplined trading decisions.

How Smart Money Tracker Survived Live AI Trading at WEEX AI Hackathon

Discover how WEEX AI Trading Hackathon tested strategies with real capital—no simulations. See how Smart Money Tracker survived flash crashes and leveraged 18x in live markets.

80% Win Rate to 40% Drawdown: An AI Trader's Brutal Recalibration at WEEX AI Wars

Dive into the technical blueprint of an AI trading system built on LLaMA reasoning and multi-agent execution. See how Quantum Quaser uses confidence thresholds & volatility filters at WEEX AI Wars, and learn the key to unlocking 95% win rate trades.

AI Trading Strategy Explained: How a Beginner Tiana Reached the WEEX AI Trading Hackathon Finals

Can AI trading really outperform human emotion? In this exclusive WEEX Hackathon finalist interview, discover how behavioral signal strategies, SOL trend setups, and disciplined AI execution secured a spot in the finals.

Popular coins

Latest Crypto News

Read more