MacSync Stealer Evolves: From ClickFix to Code-Signed Swift Malware

Dec. 23, 2025, 9:40 a.m.

Description

MacSync Stealer malware has evolved from using drag-to-terminal and ClickFix techniques to a more sophisticated approach. The new variant is delivered as a code-signed and notarized Swift application within a disk image, eliminating the need for direct terminal interaction. The malware retrieves an encoded script from a remote server and executes it via a Swift-built helper executable. The installer is signed with Developer Team ID GNJLS3UYZ4 and contains decoy files to inflate its size. The malware performs various checks, including internet connectivity and execution timing, before downloading and executing the second-stage payload. This evolution reflects a broader trend in macOS malware, where attackers attempt to bypass security measures by using signed and notarized executables.

Date

  • Created: Dec. 23, 2025, 1:59 a.m.
  • Published: Dec. 23, 2025, 1:59 a.m.
  • Modified: Dec. 23, 2025, 9:40 a.m.

Indicators

  • 06c74829d8eee3c47e17d01c41361d314f12277d899cc9dfa789fe767c03693e
  • ecfaa20f25e11878686249c7094706bc3dcd2dc0ace0f2932a39d1bfdac85863
  • 2e671bd9673d174de9b4ad8fd03049859e1d2d17ac9bc49ecc5d736505002937
  • 9990457feac0cd85f450e60c268ddf5789ed4ac81022b0d7c3021d7208ebccd3
  • 985683bd660c0c47c6be513a2d1f0a554d52d241714bb17fb18ab0d0f8cc2dc6
  • be961ec5b9f4cc501ed5d5b8974b730dabcdf7e279ed4a8c037c67b5b935d51a
  • 4ae745bc0e4631f676b3d0a05d5c74e37bdfc8da3076208b24e73e5bbea9178f
  • 7cfe0b119e616ac81ddb1767a5c7f40bec67d91fdd66e53490c0225789537073
  • 9d43e059111460c4f81351a062fb7eb7dbfd34988a06d756c7206f330c06cb42
  • c4d3e5cdb264eded917cd61b8131c40715c0ee3f4d2c94c84d60fa295ca4ed97
  • https://zkcall.net/download

Attack Patterns

  • MacSync Stealer
  • Odyssey infostealer
  • MacSync Stealer

Additional Informations

  • focusgroovy.com
  • gatemaden.space
  • zkcall.net