But now, a security researcher has discovered a simple method of bypassing Gatekeeper using a binary file already trusted by Apple to attack a user's computer (via
Ars Technica).
They have done no such thing. Gatekeeper is meant to prevent you from running apps from unidentified sources (and for power users/organizations, control which sources to allow apps to run from). It also provides a simple way to revoke the identifying certificates should someone use this to publish malware.
It does not, however, prevent malware. The Mac App Store requires sandboxing, which will limit the kinds of damage a malicious app can do to the system (basically to files/folders you grant access to the app for).
The researcher has decided that gatekeeper is meant to prevent arbitrary code execution by an app. However, for non-MAS apps, the developer has the ability to sign and distribute arbitrary code anyway - apple does not vet independently distributed apps, nor do they require them to be sandboxed.
The researcher who discovered the exploit sent news of it to Apple about 60 days ago and "believes they are working on a way to fix the underlying cause or at least lessen the damage it can do to end users." Since then, an Apple spokesperson has confirmed the company is working on a patch for the issue and has asked that the identities of the specific files used in the exploit not be disclosed.
Apple could give a crap about this in the context of non-MAS apps - I'd argue it isn't even an exploit there, again because the developer has the ability to already ship arbitrary code as part of their signed binary. Apple wants to keep developers from breaking MAS guidelines by downloading/executing arbitrary code outside a reviewed release (for a random example, a calculator app that upon typing 5318008 downloads and becomes a SNES emulator.)