Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

MacSync macOS Malware Distributed via Signed Swift Application

A recent MacSync Stealer version no longer requires users to directly interact with the terminal for execution.

macOS malware

The developers of a macOS malware named MacSync Stealer have updated their delivery mechanism, eliminating the need for direct terminal interaction, Jamf reports.

The MacSync Stealer emerged roughly half a year ago, as a rebrand of Mac.c, a macOS information stealer that was first seen in April 2025.

Mac.c was a cheap alternative to established macOS stealers, and was acquired by a malware developer who quickly expanded its capabilities and turned it into a prominent threat.

In addition to the information-stealing capabilities inherited from Mac.c, MacSync Stealer was retrofitted with backdoor capabilities through a fully-featured Go-based agent.

Similar to most macOS infostealers, it relied on social engineering techniques, such as ClickFix, to trick users into executing malicious scripts, leading to infection.

A recently observed sample, however, eliminates this step, taking a more direct, hands-off approach, Jamf says.

Advertisement. Scroll to continue reading.

The stealer’s operators packed the malware’s dropper as a code-signed and notarized Swift application inside a disk image masquerading as a zk-Call messenger installer.

“The dropper retrieves an encoded script from a remote server and executes it via a Swift-built helper executable,” Jamf explains.

The same distribution technique, the cybersecurity firm notes, has been adopted by the Odyssey infostealer family as well.

Analysis of MacSync Stealer’s new infection chain revealed a layered, evasive dropper routine focused on stealth and persistence, which includes environmental checks, network requests, Gatekeeper evasion, and validation.

MacSync Stealer started appearing in detections in mid-2025, but infected hundreds of machines relatively fast.

“This shift in distribution reflects a broader trend across the macOS malware landscape, where attackers increasingly attempt to sneak their malware into executables that are signed and notarized, allowing them to look more like legitimate applications,” Jamf notes.

Related: ClickFix Attacks Against macOS Users Evolving

Related: Apple Updates iOS and macOS to Prevent Malicious Font Attacks

Related: New XCSSET macOS Malware Variant Hijacks Cryptocurrency Transactions

Related: Widespread Infostealer Campaign Targeting macOS Users

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Sumo Logic has named Jeremy Powell as CISO and Ben Cody as SVP of Product Management.

Bitdefender has appointed Frank Koelmel as Chief Revenue Officer of Business Solutions Group.

John Hernandez has joined BlueVoyant as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.