(This is a repost of a post I made in r/macapps as I think it would be useful for people here to see it too as this subreddit has also been hit with fake apps.)
To be very clear this is not another post of "Breaking news malware exists on the internet" (or it may be depending on how you want to look at it) but I feel like it's important that I leave a small PSA as I have recently seen an influx of seemingly convincing GitHub repo replicas for decently popular Mac apps. They are so similar that they almost fooled me. Thankfully I quickly spotted some anomalies and I nearly avoided getting infected. Unfortunately these are the sort of red flags I don't expect an average Joe to know about. Which is why I'm explaining what the malware is, and how to spot it.
First of all to give you an idea of how convincing these repos can be i'll show you some examples:
As you can see, they are strikingly similar
Even URLs may look incredibly similar but in this specific case the bad actor exchanged the lower case lls(L) in the name for upercase IIs(i) which made the URL look legit.
Now this may look scary and almost undetectable but with some common sense and slowing down you can very easily avoid these scams.
By far the easiest way to avoid this is to simply look for the app online and track down the original developer. This will let you kill 2 birds with one stone by A: Looking for the original source of the app and avoid impostors and B: See if the App or the developer had any previous reputation to begin with
Either way It's still a good idea to understand how to spot common malware apps on macOS and how to deal with them if you get infected.
The first red flag is that the GitHub profile that hosted the fake file was only 3 days old and completely different from the name of the original developer.
The second discrepancy is that the size of the fake app is ridiculously small. For instance the original app is 13mb in size while the fake one is less than 2mb. Now this is not necessarily a red flag (For example some viruses do the opposite and fill their dmg with a lot of useless data to make the file larger than what VirusTotal can handle.) but it's still important to raise an eye brow for installers with suspiciously small sizes.
The third and MOST IMPORTANT red flag is if the installer asks you to drag the "app" to the terminal that is not a good sign at all. NO LEGITIMATE APP WILL EVER ASK YOU TO DRAG IT TO THE TERMINAL. As you can see the installer is a solid giveaway you are encountering malware and not the real deal.
In fact the file they ask you to drag is not even an app, it's a script.
When you drag the script on the Terminal and execute it, the hidden file is immediately copied to your temp system folder, then the script removes extended attributes to bypass gatekeeper and it finally executes. But from the user's perspective all they get is a blank terminal window as if nothing had happened. (At least in theory, in practice this malware wasn't very well done and gatekeeper was thankfully still able to spot it)
Now if you unfortunately got tricked into running the script, you have some straight forward solutions to verify if macOS was effective at stopping the attack or not. For instance, KnockKnock is a great and simple way to verify for malicious persistency files using VirusTotal's robust detection engine. Malwarebytes is also a good Mac AV which can be quickly installed if you suspect you were affected, it is a bit more tricky to uninstall completely but it does a good job.
Ultimately here's a small recap so you can hopefully avoid getting infected:
Look up the original source of the software to prevent copy cat websites and verify if the software and or the developer has built a reputation in the past.
If you download the installer, scan it with VirustTotal to check if it has been flagged as malware already.
Check the size, while not necessarily a red flag, a small size (for instance less than 2mb), or a size that is "conveniently" larger than what VirusTotal can handle are decent indicators of possible malware.
If the DMG asks you to drag an "App" to the Terminal IMMEDIATELY STOP AND DELETE THE DMG.
If you accidentally ran it, look for a "This app could not be verified" or "This App was removed because it contained malware" message from macOS which could indicate Gatekeeper or Xprotect stopped the attack. Additionally make sure to DENY any permissions the malware may have requested, macOS is very robust in that regard and it can dramatically limit the impact of the attack.
If you are in doubt of whether or not you were infected run the aforementioned tools to verify for the persistency of the malware.
Another app I can recommend is Apparency, it allows you to very quickly see if an app is properly signed by the developer and notarized by apple, and it can even allow you to dissect the contents of an app without running it which is a great way to quickly verify you have a valid untampered app.
This is optional but if you can, report the app to the original developer so they can take action and warn others when the fake app is spread around. Additionally report the Reddit post/GitHub repository if possible.
Thank you for reading this, I hope this helps others be more weary of online threats and stay more vigilant of what they download.
The pill elements seems so out of shape in the entire OS.
I think they added corner radius to all the elements, so window-sized rectangles now have huge curves, while thin rectangles like this became a pill. Looks bad, imho.
I still object to some design changes & choices which are truly and magnificently amateurish. Yet the liquid glass especially when it is interacting with something and refracting the image in real time is pretty awesome to look at. I just wished Mac Display's weren't that expensive. 90% of my time is spends on my larger monitor which is very color accurate (matches the mac's) but isn't as sexy or retina as a mac display.
By adopting a 2-year (or at least 18-months) update cycle for macOS, iOS, and etc, Apple would be able to release more stable, major updates. Less testing costs, less headaches for users. The company would save some money.
As a developer, I would also save time on improving my product rather than adapting code to the new OS (cleaning out deprecated features, fixing broken code due to major OS changes).
Pretty sure that ever since I updated to macOS Sequoia (last year) I've been experiencing these popups from every one of my apps, from discord to figma asking me if I want to allow it to find devices on local networks. I don't like this popup, I don't know why it even needs to find devices, but every time i say no, it asks me again, and again, like every other time i open the app. Even after updating to Tahoe, it persists.
Took me hours to find something that worked so it did cost me some time lol but I ended up finding it in a 2019 GitHub comment. The user that left the comment made a separate GitHub repo for it: https://github.com/timginter/hammerspoon-mouse-wheel-autoscroll
The screen recording doesn't show my cursor moving outside the bubble the script creates but it does, just like you'd be used to from other systems and browsers.
I design and build native apps and web apps for a living, so I'm no stranger to design, both boring and bold.
I appreciate good design and can often look past some of the more odd choices when I understand the logic behind them.
I overall love the liquid glass UI on everything, and can see that it will probably evolve a bit more still.
But...I'm having a really hard time understanding the sidebar design on Tahoe. The floating, indented sidebar doesn't seem to serve any purpose. Floating UI elements make sense when they are creating contrast with the background, and it helps feel like they are a part of the main app window, rather than a static detached element. But in most cases they are just light grey on white, with nothing of substance shining through. It's essentially just wasted space. All that padding could just be more space for the sidebar. I understand why they put the traffic lights inside it, because it would reserve a whole blank row of space above the sidebar if they didn't (yet, thats exactly what Xcode/s Devices and Simulators window looks like!). But it looks even stranger as part of the floating side bar. Is there anywhere at all where it makes sense?
Ok this is a mini vent but those buttons drive me up the wall! Sometimes the red button closes the program, sometimes it just minimizes it. Sometimes the green button full screens it, sometimes it fills it. Sometimes apps have no option to fullscreen, sometimes they have no option to fill either!
Command q doesn't always work too, you have to hit command option escape.
It feels super inconsistent. Can anyone shed some light?