To inhibit the installation of malware through its App Store and from running on Apple-developed devices, Apple uses a range of technologies. We will then discuss some recent examples of Apple-notarized malware and some prevention techniques. Let us start by exploring what Apple notarization is. Such Apple-notarized malware constitutes a threat to macOS users.
Although Apple introduced a notarization mechanism to scan and prevent malicious code from running on Apple devices, attackers have found ways to circumvent this process.