Skip to content

New macOS Cyber Attacks Exploit EV Certificates for Legitimacy

EV certificates give malicious installers a legitimate face. Users urged to be cautious when downloading software from untrusted sources.

This picture shows bunch of apples in the box.
This picture shows bunch of apples in the box.

New macOS Cyber Attacks Exploit EV Certificates for Legitimacy

A new wave of cyber attacks targeting macOS users has been discovered. Attackers are exploiting Extended Validation (EV) certificates to lend legitimacy to malicious payloads, making detection difficult. The abuse of these certificates has been noted by security researcher @g0njxa.

The campaign begins with phishing lures that lead users to compromised websites hosting signed DMG installers. These installers bear valid Developer ID Application signatures, including one issued under the name 'THOMAS BOULAY DUVAL (J97GLQ5KW9)'. The sample's bundle identifier mimics the signer name to blend in with legitimate software distributions.

The malicious disk images are fully undetectable on VirusTotal and bypass built-in macOS security checks. Adversaries are investing in Apple EV certificates, knowing that revocation may not prevent initial compromise. Once reported, these certificates are revoked, but the damage is already done in the early stages of the campaign.

The increasing abuse of EV certificates on macOS threats highlights the evolving tactics of cyber attackers. Users are advised to remain vigilant, especially when downloading software from untrusted sources. Security researchers continue to monitor these developments to protect macOS users.

Read also:

Latest