Common malware slipped past the macOS notarization process twice

Apple immediately revoked the notarization, but the adware slipped through again

Apple launched a notarization process for all apps and software created for macOS in February to weed out malware. Recently, a college student discovered adware with a full macOS notarization, according to WIRED

Mac computers were once impenetrable vaults, which led to few hackers attempting to infiltrate them. Those who tried would generally hit roadblocks. Today, Macs are hacked nearly as often as PCs, which lead to the February launch of Apple’s notarization process. 

This notarization is required for all apps and software designed for macOS. And if the notarization doesn’t exist, a user can’t run the software without a workaround. However, college student Peter Dantini purposefully downloaded malware, fully expecting his Mac to reject the installation. To his surprise, the well-traveled Shlayer adware installed on his machine without issue. 

Dantini alerted Apple of the notarized malware on Aug. 28, and Apple immediately revoked the notarization certificates. Unfortunately, two days later, the malware reappeared with a notarization from a different Apple Developer ID. Dantini again alerted Apple of the issue. 

Apple addressed the issue, saying, "Malicious software constantly changes, and Apple’s notarization system helps us keep malware off the Mac and allow us to respond quickly when it’s discovered.” The company continued, "Upon learning of this adware, we revoked the identified variant, disabled the developer account, and revoked the associated certificates. We thank the researchers for their assistance in keeping our users safe."

The fact that Apple quickly addressed the situation is reassuring, but this is proof that relying on Apple’s notarization system alone isn’t enough. While it can help prevent most malware, having a strong antivirus and a critical eye for iffy apps is key. 

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Recommended

Most Docker container images have critical flaws
containers

Most Docker container images have critical flaws

2 Dec 2020
M1 Mac mini users suffering Bluetooth connectivity problems
Hardware

M1 Mac mini users suffering Bluetooth connectivity problems

25 Nov 2020
Apple unveils updated Mac lineup powered by its new M1 chip
Hardware

Apple unveils updated Mac lineup powered by its new M1 chip

10 Nov 2020
Apple will require developers to add privacy nutrition labels to apps
privacy

Apple will require developers to add privacy nutrition labels to apps

6 Nov 2020

Most Popular

350,000 Spotify users hacked in credential stuffing attack
Security

350,000 Spotify users hacked in credential stuffing attack

24 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
Samsung Galaxy Note might be discontinued in 2021
Mobile Phones

Samsung Galaxy Note might be discontinued in 2021

1 Dec 2020