Skip to content
adware

MacKeeper

MacKeeper is a legitimate macOS utility application originally marketed as a system optimization, security, and cleanup tool. However, older versions and maliciously bundled or impersonated variants have been widely classified as Potentially Unwanted Programs (PUPs) or adware. Attackers have distributed trojanized or fake MacKeeper installers to trick users into granting elevated privileges, installing additional unwanted software, redirecting browser traffic, harvesting system information, or generating fraudulent security alerts to pressure users into payment.

Malicious variants often rely on social engineering rather than direct exploitation to convince users that their systems are infected or degraded, prompting installation. Once installed, these variants may establish persistence, inject browser extensions, modify system settings, or communicate with remote servers for telemetry or further payload delivery.

Symptoms

You might observe the following associated with this threat:

  • Persistent pop-ups claiming critical system issues or infections.

  • Unexpected browser redirects or injected advertisements.
  • Installation of unauthorized browser extensions.
  • Modified homepage or search engine settings.
  • New login attempts, LaunchAgents, or LaunchDaemons are created without user approval.
  • Elevated CPU usage due to background scanning processes.
  • Requests for administrator credentials shortly after installation.

Technical Breakdown

Malicious or trojanized MacKeeper variants are commonly distributed through deceptive advertisements, fake software update prompts, torrent bundles, and phishing campaigns. MacKeeper-related infections typically rely on user-driven installation and consent manipulation. Once executed, the installer may request elevated privileges via macOS authorization prompts. After privileges are granted, the software may:

  • Install LaunchAgents or LaunchDaemons for persistence.

  • Deploy browser extensions to Safari, Chrome, or Firefox.
  • Modify DNS settings or proxy configurations.
  • Establish outbound HTTPS connections to remote telemetry or advertising infrastructure.
  • Collect system profiling data, including OS version, installed software, and device identifiers.

In impersonation cases, attackers may bundle additional adware, malware stealers, and credential harvesters. Some variants use scareware techniques, displaying exaggerated threat warnings to coerce payment or subscription enrollment. In enterprise environments, widespread installation may increase risk exposure by weakening browser security posture, introducing shadow IT software, or creating opportunities for secondary payload delivery. Because many variants are signed or masquerade as legitimate software, traditional antivirus detection may classify them as PUPs rather than outright malware, requiring stricter endpoint control policies for prevention.

Next Steps

Iru Endpoint Detection & Response (EDR) can detect and quarantine known malicious or unwanted MacKeeper variants when file monitoring is configured to Protect. However, removal of the application may not automatically restore modified browser settings, DNS configurations, or persistence mechanisms.

Security teams should:

  • Audit and remove unauthorized LaunchAgents and Login Items.
  • Reset browser settings and remove suspicious extensions.
  • Enforce least privilege policies to prevent unauthorized software installation.
  • Restrict the installation of PUP classified software via MDM controls.
  • Educate users on how to recognize scareware tactics and deceptive advertisements.
  • Monitor outbound connections for abnormal recurring traffic to unknown domains.

Implementing strong application control policies and user awareness training significantly reduces the risk of socially engineered malware installations in macOS environments.

Stay up to date

Iru's weekly collection of articles, videos, and research to keep IT & Security teams ahead of the curve.