Safety Chew: A be aware on the rising downside of Apple-notarized malware on macOS


9to5Mac Safety Chew is completely dropped at you by Mosyle, the one Apple Unified Platform. Making Apple units work-ready and enterprise-safe is all we do. Our distinctive built-in method to administration and safety combines state-of-the-art Apple-specific safety options for absolutely automated Hardening & Compliance, Subsequent Era EDR, AI-powered Zero Belief, and unique Privilege Administration with probably the most highly effective and fashionable Apple MDM available on the market. The result’s a very automated Apple Unified Platform presently trusted by over 45,000 organizations to make hundreds of thousands of Apple units work-ready with no effort and at an reasonably priced price. Request your EXTENDED TRIAL as we speak and perceive why Mosyle is every little thing you might want to work with Apple.


Final week, Jamf Menace Labs revealed analysis on one more variant of the more and more fashionable MacSync Stealer household calling consideration to a rising downside in macOS safety: malware that’s sneaking round Apple’s most vital third occasion app protections. This new variant was distributed inside a malicious app that was each code-signed with a sound Developer ID and notarized by Apple, which means Gatekeeper had no motive to dam it from launching.

Traditionally, Apple’s mannequin has labored fairly properly. Apps distributed exterior the Mac App Retailer have to be cryptographically signed and notarized to open with out having customers bounce by way of lots of hoops. However that belief mannequin assumes that signing proves good intent. What we’re seeing now could be that attackers are acquiring actual developer certificates and delivery malware that appears indistinguishable from legit software program on the time of set up.

After talking with a number of individuals conversant in the matter, there are a couple of methods menace actors are going about attaining this. In lots of circumstances, they’re utilizing a mixture of the next:

Signed and notarized malicious apps may very well be working with Developer ID certificates which are compromised and even bought through underground channels, which considerably lowers suspicion. As we noticed in Jamf’s report on a new MacSync Stealer variant, the preliminary binary is usually a comparatively easy Swift-based executable that seems benign throughout Apple’s static evaluation and does little by itself.

The true malicious habits occurs later, when the app reaches out to distant infrastructure to fetch further payloads. If these payloads aren’t out there throughout notarization and solely activate beneath real-world runtime circumstances, Apple’s scanners don’t have anything malicious to research. The notarization course of evaluates what exists at submission time, not what an app could retrieve after launch, and attackers are clearly designing round that boundary.

The primary occasion of Apple-notarized malware dates again to not less than 2020, found by a Twitter consumer. Earlier this July, there was one other occasion of an analogous malicious software that was signed and notarized by Apple. Now, has this reached the boiling level? In all probability not. On one hand, I agree that even one occasion of this taking place is one too many.

Then again, I feel it’s too simple to place the blame on Apple right here. The system is basically working as designed. Code signing and notarization have been by no means meant to ensure that software program is benign perpetually, solely that it may be traced again to an actual developer and revoked when abuse is found.

That is an intriguing assault vector and one I’ll proceed to trace going into 2026.

On the finish of the day, the perfect protection towards malware is to obtain software program immediately from builders you belief or from the Mac App Retailer.


Safety Chew is 9to5Mac’s weekly deep dive into the world of Apple safety. Every week, Arin Waichulis unpacks new threats, privateness considerations, vulnerabilities, and extra, shaping an ecosystem of over 2 billion units.

Follow Arin: Twitter/X, LinkedIn, Threads

FTC: We use earnings incomes auto affiliate hyperlinks. Extra.