
If you had either of the two strictest settings of Gatekeeper on - which it is by default, you would never have been infected. However, Handbrake doesn't sign its downloads for a variety of reasons. Most Mac users probably can't install Handbreak and are safe from this issue (unless someone told them either how to turn off Gatekeeper or to hold down the Control key while double clicking on the app to get around Gatekeeper). If you download software from a website that isn't signed, you should always get the SHA256 signature of that download and verify your download against that signature. If you did that, you would have seen it didn't match and known not to install the software.

And yes, you shouldn't expect a normal user to do this, but then these normal users are also protected by Gatekeeper and would be unable to install Handbrake in the first place. What we have are users who were technical enough to turn off Gatekeeper or get around it, but not technical enough to understand what type of danger this puts them in.Īnd, there's almost nothing Apple can do to prevent you from infecting your system when you go around Gatekeeper.

You give the Handbrake permission to do anything it needs to install itself on your Mac, and if that copy of Handbrake is infected, you gave it permission to view or install anything it wants.īut. Last time I watched an Apple commercial they told me I didn't have to worry about stuff like this.Ĭonsidering they haven't aired those commercials since they were found out to be false and misleading - like in the 1990's - you must not have watched many Apple commercials in the last 20 years. That said, there is STILL, very much so, a lack of awareness about their vulnerability to malware/viruses among the majority of Mac users, and the generally mistaken impression that Apple products are impervious to nefarious infections like these.
