#MacSyncStealer

2025-12-23 (Tuesday): Based on yesterday's Jamf article, I downloaded the fake installer for #MacSyncStealer from zkcall[.]net and ran it on a macOS host in my lab.

A #pcap of the #MacSync #Stealer traffic, the associated IOCs, the #malware sample, and a link to the Jamf article are at www.malware-traffic-analysis.net/2025/12/23/index.html

Of note, the zkcall[.]net download page also has a link for a Windows download. The downloaded EXE file appears to be #DonutLoader, based on one of the follow-up EXE files it retrieved and ran: app.any.run/tasks/afd3ae74-297

Downloading the initial file, a DMG image.Screenshot showing the malicious downloaded DMG image and the associated malicious Mach-O file within the installer.app content.Traffic generated by the MacSync Stealer malware, filtered in Wireshark.Example of the data exfiltrated through the MacSync Stealer C2 traffic.
2025-12-23

Macbook users watch out! New MacSync Stealer malware is slipping past Apple’s notarization, disguised as a trusted app and stealing saved passwords from macOS devices, experts warn.

Read: hackread.com/macsync-stealer-m

#Malware #Apple #CyberSecurity #macOS #MacSyncStealer

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst