Cybersecurity researchers have uncovered a new variant of the MacSync info-stealer that is being distributed through a sophisticated dropper designed to evade Apple's built-in security controls. The malware is hidden within a .dmg installer for a fake messaging application. Critically, the dropper has been digitally signed with a valid developer certificate and has passed Apple's automated notarization process. This allows it to bypass macOS's Gatekeeper feature, which is designed to block untrusted software. This campaign highlights how threat actors can abuse platform trust mechanisms to deploy malware, underscoring that even notarized applications can be malicious.
The attack begins when a user is tricked into downloading a disk image file named zk-call-messenger-installer-3.9.2-lts.dmg from a malicious website designed to look like a legitimate software download page. The file contains what appears to be an installer for a messaging app.
The key to this attack's success is its subversion of macOS security features. Gatekeeper is a core macOS security technology that, by default, ensures only software from the App Store or from identified, notarized developers can run. Notarization is an automated service where developers submit their apps to Apple to be scanned for malicious components. A notarized app receives a 'ticket' from Apple, assuring Gatekeeper that the software has been checked and is safe to open.
In this campaign, the threat actors managed to get their malicious dropper notarized, likely by ensuring the initial dropper application contained no overtly malicious code that Apple's automated scanner could detect. Once the user runs the seemingly legitimate installer, it then proceeds to download and execute the MacSync info-stealer payload, which is designed to steal credentials, cookies, and other sensitive data from the victim's machine.
zk-call-messenger-installer-3.9.2-lts.dmg)T1553.002 - Code Signing: The attackers used a valid digital signature to make the malware appear legitimate and to pass initial security checks. This is a form of masquerading.T1204.002 - Malicious File: The user is induced to execute the malicious .dmg file, believing it to be a legitimate installer.T1140 - Deobfuscate/Decode Files or Information: The dropper likely contains an encoded or encrypted payload (the MacSync stealer) that it decodes and runs only after execution, a technique used to evade static analysis during notarization.T1059.007 - JavaScript/JXA: macOS malware often uses AppleScript or JavaScript for Automation (JXA) to execute secondary payloads, a likely method for the dropper.The primary impact is the theft of sensitive information from macOS users, which can lead to financial loss, account takeovers, and identity theft. More broadly, this attack erodes trust in Apple's ecosystem security. Users are trained to trust notarized apps, and this campaign demonstrates that this trust can be misplaced. It forces Apple to continually refine its automated scanning and developer vetting processes, and it reminds security professionals that platform-level controls like Gatekeeper are not foolproof.
| Type | Value | Description |
|---|---|---|
| File Name | zk-call-messenger-installer-3.9.2-lts.dmg |
The malicious disk image file containing the notarized dropper. |
D3-PA - Process Analysis to identify when the seemingly benign installer spawns malicious child processes. D3-OTF - Outbound Traffic Filtering can block the malware from exfiltrating stolen data.D3-EAL - Executable Allowlisting is a powerful mitigation, as it would prevent the malicious zk-call-messenger-installer from running in the first place if it's not on the approved list. This provides a much stronger defense than relying on Apple's notarization process alone.Use application control solutions to prevent the execution of unauthorized or untrusted applications, regardless of their notarization status.
Deploy advanced endpoint security (EDR) that uses behavioral analysis to detect malicious activity, rather than relying solely on signatures or platform trust mechanisms.
Educate users about the risks of downloading software from unofficial sources, even if it appears to be signed and notarized.
In a corporate environment, the most effective defense against threats like the notarized MacSync dropper is executable allowlisting. Instead of relying on a denylist or Apple's vetting, the organization defines a strict list of approved applications that are permitted to run. Any application not on this list, including the malicious zk-call-messenger-installer, would be blocked from executing by default. This shifts the security model from 'block known bad' to 'allow known good,' providing a much stronger posture against novel and evasive malware.
Deploy an EDR solution on macOS endpoints to perform continuous process analysis. Even though the initial dropper was notarized, its post-execution behavior would be suspicious. An EDR tool would monitor the process tree and detect when the 'installer' makes an unexpected outbound network connection to download the second-stage MacSync payload, or when it attempts to access sensitive locations like the Keychain or browser credential stores. By focusing on malicious behavior rather than just the initial file signature, EDR can catch threats that bypass static checks like notarization.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats