MITRE ATT&CK Technique
Defense Evasion T1553.001
Description

Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apple’s security model to ensure only trusted applications are executed on a host. Gatekeeper was built on top of File Quarantine in Snow Leopard (10.6, 2009) and has grown to include Code Signing, security policy compliance, Notarization, and more. Gatekeeper also treats applications running for the first time differently than reopened applications.(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: TheEclecticLightCompany apple notarization ) Based on an opt-in system, when files are downloaded an extended attribute (xattr) called `com.apple.quarantine` (also known as a quarantine flag) can be set on the file by the application performing the download. Launch Services opens the application in a suspended state. For first run applications with the quarantine flag set, Gatekeeper executes the following functions: 1. Checks extended attribute – Gatekeeper checks for the quarantine flag, then provides an alert prompt to the user to allow or deny execution.(Citation: OceanLotus for OS X)(Citation: 20 macOS Common Tools and Techniques) 2. Checks System Policies - Gatekeeper checks the system security policy, allowing execution of apps downloaded from either just the App Store or the App Store and identified developers. 3. Code Signing – Gatekeeper checks for a valid code signature from an Apple Developer ID. 4. Notarization - Using the `api.apple-cloudkit.com` API, Gatekeeper reaches out to Apple servers to verify or pull down the notarization ticket and ensure the ticket is not revoked. Users can override notarization, which will result in a prompt of executing an “unauthorized app” and the security policy will be modified. Adversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton) Applications and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command may not set the quarantine flag. Additionally, it is possible to avoid setting the quarantine flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).

Supported Platforms
macOS
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-02-05T16:16:08.471Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may modify file attributes and subvert Gatekeeper '
                'functionality to evade user prompts and execute untrusted '
                'programs. Gatekeeper is a set of technologies that act as '
                'layer of Apple’s security model to ensure only trusted '
                'applications are executed on a host. Gatekeeper was built on '
                'top of File Quarantine in Snow Leopard (10.6, 2009) and has '
                'grown to include Code Signing, security policy compliance, '
                'Notarization, and more. Gatekeeper also treats applications '
                'running for the first time differently than reopened '
                'applications.(Citation: TheEclecticLightCompany Quarantine '
                'and the flag)(Citation: TheEclecticLightCompany apple '
                'notarization )\n'
                '\n'
                'Based on an opt-in system, when files are downloaded an '
                'extended attribute (xattr) called `com.apple.quarantine` '
                '(also known as a quarantine flag) can be set on the file by '
                'the application performing the download. Launch Services '
                'opens the application in a suspended state. For first run '
                'applications with the quarantine flag set, Gatekeeper '
                'executes the following functions:\n'
                '\n'
                '1. Checks extended attribute – Gatekeeper checks for the '
                'quarantine flag, then provides an alert prompt to the user to '
                'allow or deny execution.(Citation: OceanLotus for OS '
                'X)(Citation: 20 macOS Common Tools and Techniques)\n'
                '\n'
                '2. Checks System Policies - Gatekeeper checks the system '
                'security policy, allowing execution of apps downloaded from '
                'either just the App Store or the App Store and identified '
                'developers.\n'
                '\n'
                '3. Code Signing – Gatekeeper checks for a valid code '
                'signature from an Apple Developer ID.\n'
                '\n'
                '4. Notarization - Using the `api.apple-cloudkit.com` API, '
                'Gatekeeper reaches out to Apple servers to verify or pull '
                'down the notarization ticket and ensure the ticket is not '
                'revoked. Users can override notarization, which will result '
                'in a prompt of executing an “unauthorized app” and the '
                'security policy will be modified.\n'
                '\n'
                'Adversaries can subvert one or multiple security controls '
                'within Gatekeeper checks through logic errors (e.g. '
                '[Exploitation for Defense '
                'Evasion](https://attack.mitre.org/techniques/T1211)), '
                'unchecked file types, and external libraries. For example, '
                'prior to macOS 13 Ventura, code signing and notarization '
                'checks were only conducted on first launch, allowing '
                'adversaries to write malicious executables to previously '
                'opened applications in order to bypass Gatekeeper security '
                'checks.(Citation: theevilbit gatekeeper bypass '
                '2021)(Citation: Application Bundle Manipulation Brandon '
                'Dalton)\n'
                '\n'
                'Applications and files loaded onto the system from a USB '
                'flash drive, optical disk, external hard drive, from a drive '
                'shared over the local network, or using the curl command may '
                'not set the quarantine flag. Additionally, it is possible to '
                'avoid setting the quarantine flag using [Drive-by '
                'Compromise](https://attack.mitre.org/techniques/T1189).',
 'external_references': [{'external_id': 'T1553.001',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1553/001'},
                         {'description': 'Brandon Dalton. (2022, August 9). A '
                                         'bundle of nerves: Tweaking macOS '
                                         'security controls to thwart '
                                         'application bundle manipulation. '
                                         'Retrieved September 27, 2022.',
                          'source_name': 'Application Bundle Manipulation '
                                         'Brandon Dalton',
                          'url': 'https://redcanary.com/blog/mac-application-bundles/'},
                         {'description': 'Csaba Fitzl. (2021, June 29). '
                                         'GateKeeper - Not a Bypass (Again). '
                                         'Retrieved September 22, 2021.',
                          'source_name': 'theevilbit gatekeeper bypass 2021',
                          'url': 'https://theevilbit.github.io/posts/gatekeeper_not_a_bypass/'},
                         {'description': 'Eddie Lee. (2016, February 17). '
                                         'OceanLotus for OS X - an Application '
                                         'Bundle Pretending to be an Adobe '
                                         'Flash Update. Retrieved July 5, '
                                         '2017.',
                          'source_name': 'OceanLotus for OS X',
                          'url': 'https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update'},
                         {'description': 'hoakley. (2020, October 29). '
                                         'Quarantine and the quarantine flag. '
                                         'Retrieved September 13, 2021.',
                          'source_name': 'TheEclecticLightCompany Quarantine '
                                         'and the flag',
                          'url': 'https://eclecticlight.co/2020/10/29/quarantine-and-the-quarantine-flag/'},
                         {'description': 'How Notarization Works. (2020, '
                                         'August 28). How notarization works. '
                                         'Retrieved September 13, 2021.',
                          'source_name': 'TheEclecticLightCompany apple '
                                         'notarization ',
                          'url': 'https://eclecticlight.co/2020/08/28/how-notarization-works/'},
                         {'description': 'Phil Stokes. (2021, February 16). 20 '
                                         'Common Tools & Techniques Used by '
                                         'macOS Threat Actors & Malware. '
                                         'Retrieved August 23, 2021.',
                          'source_name': '20 macOS Common Tools and Techniques',
                          'url': 'https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/'}],
 'id': 'attack-pattern--31a0a2ac-c67c-4a7e-b9ed-6a96477d4e8e',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'}],
 'modified': '2025-10-24T17:48:36.535Z',
 'name': 'Gatekeeper Bypass',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Brandon Dalton @PartyD0lphin',
                          'Swasti Bhushan Deb, IBM India Pvt. Ltd.'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['macOS'],
 'x_mitre_version': '1.3'}
Quick Actions