- Content source
- https://cybersecuritynews.com/new-macsync-stealer-malware/
Full Story:A new version of MacSync Stealer malware is targeting macOS users through digitally signed and notarized applications, marking a major shift in how this threat is delivered.
Unlike older versions that required users to paste commands into Terminal, this updated variant operates silently in the background.
The malware comes disguised as a legitimate installer, distributed through a fake website under the name zk-call-messenger-installer-3.9.2-lts.dmg.
Once installed, it downloads and runs a hidden script that steals sensitive information from the victim’s computer.
The malware is packaged as a Swift application and signed with Apple’s Developer Team ID GNJLS3UYZ4, which allows it to bypass initial security warnings that macOS usually shows for untrusted software.
New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps
New MacSync Stealer targets macOS via signed apps, silently stealing data while bypassing Apple security warnings.
cybersecuritynews.com
