Skip to main content

Apple mistakenly verified a macOS malware

A malware Mac package slipped past Apple’s verification process, a new report finds. As per security researcher, Patrick Wardle, Apple inadvertently approved a malicious desktop app that was disguised as an Adobe Flash installer to trick users.

Apple allows Mac users to install apps from sources outside of its own App Store. However, to ensure this policy doesn’t end up infesting Macs with viruses and malware, the company has a process called “notarization” that scans apps for security issues. Developers are required to submit their code prior to distribution for approval. If an app is unable to get past this verification stage, it is automatically blocked by Mac’s built-in screening program, Gatekeeper — irrespective of where it was downloaded from.

Wardle discovered that a popular malware called Shlayer, which security firm Kaspersky labeled as the most common threat that Macs faced in 2019, featured snippets of code that were officially notarized by Apple. Therefore, if someone downloaded and tried to run this on their Mac, they wouldn’t be alerted through any warnings. Shlayer is an adware that can intercept your web traffic and replace the webpages you try to load with its own malicious ads.

Apple’s review process couldn’t detect the malware and green-lighted it to run on all macOS versions, even Big Sur that is currently in beta.

“As far as I know, this is a first: malicious code gaining Apple’s notarization ‘stamp of approval’,” Wardle wrote in the blog post.

Since it was reported, Apple says it has patched and revoked the notarized payloads. Soon after that, however, the same group of attackers somehow released a new, notarized package — which Apple confirmed has been banned as well.

“Malicious software constantly changes, and Apple’s notarization system helps us keep malware off the Mac and allows us to respond quickly when it’s discovered,” Apple commented in a statement to Digital Trends. “Upon learning of this adware, we revoked the identified variant, disabled the developer account, and revoked the associated certificates. We thank the researchers for their assistance in keeping our users safe.”

Shubham Agarwal
Former Digital Trends Contributor
Shubham Agarwal is a freelance technology journalist from Ahmedabad, India. His work has previously appeared in Firstpost…
Your 2018 MacBook Air is officially ‘vintage’
apple 2015 notebook market share macbook close up snow leopard mac

Apple has added 12 more Macs to its vintage and obsolete lists, affecting the hardware service users can access. If your Mac has joined one of the lists, it could become harder to get it repaired by Apple.

As spotted by MacRumors, these three Macs have been added to the vintage list:

Read more
macOS Sequoia may be breaking important security tools
macOS Sequoia being introduced by Apple's Craig Federighi at the Worldwide Developers Conference (WWDC) 2024.

Apple released macOS Sequoia on Monday, but the update has broken the functionality for some networking and security tools from companies such as Microsoft, CrowdStrike, SentinelOne, and more, as Bleeping Computer reports. Affected users on Reddit are sharing their issues with security software such as ESET Endpoint Security and CrodStrike Falcon.

Other reported issues include firewalls causing packet corruptions, browser SSL failures, and the inability to use the "curl" or "get" commands. Users can fix the problem quickly by turning off the tools, which indicates an incompatibility issue with the network stack, but this is not the fix many may be looking for.

Read more
The MacBook Air M4 could launch sooner than we thought
The M3 MacBook Air in front of a window.

Spotted by MacRumors, display industry analyst Ross Young has posted a subscriber-only tweet revealing that panel shipments for the MacBook Air M4 should be starting in October.

Bloomberg's Mark Gurman then confirmed his own information points to the same conclusion -- that Apple will launch the next MacBook Air during the first quarter of 2025.

Read more