MacSync Stealer Evolves: From ClickFix to Code-Signed Swift Malware
Dec. 23, 2025, 9:40 a.m.
Description
MacSync Stealer malware has evolved from using drag-to-terminal and ClickFix techniques to a more sophisticated approach. The new variant is delivered as a code-signed and notarized Swift application within a disk image, eliminating the need for direct terminal interaction. The malware retrieves an encoded script from a remote server and executes it via a Swift-built helper executable. The installer is signed with Developer Team ID GNJLS3UYZ4 and contains decoy files to inflate its size. The malware performs various checks, including internet connectivity and execution timing, before downloading and executing the second-stage payload. This evolution reflects a broader trend in macOS malware, where attackers attempt to bypass security measures by using signed and notarized executables.
Tags
Date
- Created: Dec. 23, 2025, 1:59 a.m.
- Published: Dec. 23, 2025, 1:59 a.m.
- Modified: Dec. 23, 2025, 9:40 a.m.
Indicators
- 06c74829d8eee3c47e17d01c41361d314f12277d899cc9dfa789fe767c03693e
- ecfaa20f25e11878686249c7094706bc3dcd2dc0ace0f2932a39d1bfdac85863
- 2e671bd9673d174de9b4ad8fd03049859e1d2d17ac9bc49ecc5d736505002937
- 9990457feac0cd85f450e60c268ddf5789ed4ac81022b0d7c3021d7208ebccd3
- 985683bd660c0c47c6be513a2d1f0a554d52d241714bb17fb18ab0d0f8cc2dc6
- be961ec5b9f4cc501ed5d5b8974b730dabcdf7e279ed4a8c037c67b5b935d51a
- 4ae745bc0e4631f676b3d0a05d5c74e37bdfc8da3076208b24e73e5bbea9178f
- 7cfe0b119e616ac81ddb1767a5c7f40bec67d91fdd66e53490c0225789537073
- 9d43e059111460c4f81351a062fb7eb7dbfd34988a06d756c7206f330c06cb42
- c4d3e5cdb264eded917cd61b8131c40715c0ee3f4d2c94c84d60fa295ca4ed97
- https://zkcall.net/download
Additional Informations
- focusgroovy.com
- gatemaden.space
- zkcall.net