Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

New Mac malware uses 'novel' tactic to bypass macOS Catalina security

A new piece of Mac malware can bypass macOS Catalina security restrictions.

Security researchers at antivirus firm Intego have discovered a new Mac malware in the wild that tricks users into bypassing modern macOS app security protections.

In macOS Catalina, Apple introduced new app notarization requirements. The features, baked in Gatekeeper, discourage users from opening unverified apps — requiring malware authors to get more creative with their tactics.

As an example, Intego researchers have discovered a new Trojan horse malware actively spreading in the wild via poisoned Google search results that tricks users into bypassing those protections themselves.

The malware is delivered as a .dmg disk image masquerading as an Adobe Flash installer. But once it's mounted on a user's machine, it displays instructions guiding users through the malicious installation process.

The normal prompt that appears when an unverified button is clicked. Credit: Intego
The normal prompt that appears when an unverified button is clicked. Credit: Intego

In a tactic described by Intego as "novel," the malware asks users to right-click and open the malware instead of double-clicking it. Per macOS Catalina Gatekeeper settings, this displays a dialogue box that has an "Open" button. Normally, when clicking an unverified file, Apple doesn't allow users to open them so conveniently.

Right-clicking and opening a file allows users to run unverified software more easily. Credit: Intego
Right-clicking and opening a file allows users to run unverified software more easily. Credit: Intego

Normally, macOS discourages users from opening unverified apps by making the process more difficult. Specifically, forcing users to head into System Preferences to override Gatekeeper. The strategy also saves bad actors from signing up for an Apple Developer account or hijacking an existing one.

Once users actually open the installer app, it runs a bash shell script and extracts a password-protected .zip file that contains a more traditional malicious app bundle. Although it initially installs a legitimate version of Flash, Intego notes that it can also be used to download "any other Mac malware or adware package."

Interestingly, the malware has been spread via Google search results that redirect users to malicious webpages claiming that a browser's Flash Player is out of date. Intego added that the malware has, thus far, been able to avoid detection by most antivirus software.

The actual malicious portions of the malware are re-engineered variants of past macOS Trojans, such as Shlayer or Bundlore. Intego also spotted similar security-evading malware in 2019.

Who's at risk and how to avoid it

Even though Adobe Flash player will officially reach its end of life on Dec. 31, 2020, Intego notes that "outdated Flash" malware tends to be pretty successful. The aforementioned Shlayer Trojan, for example, infects about one in 10 Mac users.

Since the malware is actively spreading via Google search results, the risk for compromise is a bit higher. Intego notes that it appears when users search for the exact titles of YouTube videos.

Users can avoid this malware by only clicking on links that they absolutely trust. If any website asks you to download something unsolicited, get out of there.

Indicators of compromise can include the following apps: flashInstaller.dmv in Downloads; a file or a file named "Installer" in a subfolder in private/var/folders.

Intego notes that several domains — including,, and — have been associated with this campaign. Any traffic to or from these domains "should be considered a possible sign of an infection," the researchers said.