Malware Circumvents macOS Gatekeeper by Exploiting Apple’s Notarization Process

Malware Exploits Apple’s Notarization to Evade macOS Gatekeeper

In a recent development, cybersecurity experts have identified a new variant of the MacSync Stealer malware that cleverly circumvents macOS’s Gatekeeper security by exploiting Apple’s notarization process. This sophisticated approach underscores the evolving tactics of cybercriminals targeting Mac users.

Understanding Gatekeeper and Notarization

Apple’s Gatekeeper is a security feature designed to ensure that only trusted software runs on a Mac. It verifies applications to prevent the execution of malicious code. Complementing this, Apple’s notarization process involves developers submitting their apps to Apple for a security check, which scans for malicious content and other security issues. Once an app passes this check, it receives a notarization ticket, signaling to Gatekeeper that the app is safe to run.

The Exploit: A Closer Look

The latest variant of MacSync Stealer introduces a novel method to bypass these security measures. Traditionally, malware required users to perform specific actions, such as right-clicking and selecting Open, to bypass Gatekeeper warnings. However, this new variant simplifies the process:

1. Notarized Swift Application: The malware is embedded within a Swift-based application that has been code-signed and notarized by Apple. This means the application appears legitimate and trustworthy to both the system and the user.

2. Deceptive Installation Process: Users are prompted to download an installer for a fictitious application named zk-Call & Messenger from a web browser. Given its notarized status, the installer can be opened with a simple double-click, without triggering any security warnings.

3. Payload Delivery: Upon execution, the installer doesn’t contain the malicious payload directly. Instead, it fetches a secondary payload from a remote server, which is then installed on the system. This two-stage process makes detection more challenging.

Implications and Concerns

This exploitation of the notarization process is particularly concerning for several reasons:

– Erosion of Trust: Users rely on Apple’s notarization as a mark of safety. By infiltrating this system, attackers undermine user confidence in these security measures.

– Increased Vulnerability: The simplicity of this method means that even users who are cautious about security prompts may be deceived, leading to a higher rate of successful infections.

– Evolving Threat Landscape: This tactic highlights the continuous evolution of malware strategies, emphasizing the need for constant vigilance and adaptation in cybersecurity practices.

Historical Context

This isn’t the first instance where Apple’s notarization process has been exploited:

– 2020 Incident: Security researchers discovered that Apple’s automated notarization process mistakenly approved a piece of malware disguised as a Flash installer. This allowed the malware to run on Macs without triggering Gatekeeper warnings. ([appleinsider.com](https://appleinsider.com/articles/20/08/31/apples-automated-notarization-process-mistakenly-approved-mac-malware?utm_source=openai))

– ChillyHell Backdoor: In 2025, the ChillyHell backdoor was found to have been hiding in notarized Mac apps for four years, having passed Apple’s checks in 2021 and remaining unnoticed until recently. ([appleinsider.com](https://appleinsider.com/articles/25/09/10/chillyhell-backdoor-hid-in-notarized-mac-apps-for-four-years?utm_source=openai))

Apple’s Response and User Recommendations

Upon being informed of the new MacSync Stealer variant, Apple took swift action by revoking the associated Developer Team ID and its certificate. However, this incident serves as a stark reminder that no security system is infallible.

To enhance security, users are advised to:

– Download from Trusted Sources: Always obtain software directly from the Mac App Store or the official websites of reputable developers.

– Stay Updated: Regularly update macOS and all installed applications to benefit from the latest security patches.

– Exercise Caution: Be wary of unsolicited prompts to download or install software, especially from unfamiliar websites or emails.

– Utilize Security Software: Consider using reputable antivirus or anti-malware solutions to provide an additional layer of protection.

Conclusion

The exploitation of Apple’s notarization process by the MacSync Stealer malware variant is a significant development in the cybersecurity landscape. It underscores the importance of continuous vigilance, both from tech companies in fortifying their security measures and from users in adopting safe computing practices.