Urgent Alert for Apple Users: Banshee Malware Returns

Warning for Apple Users Old Cyber Threat Returns in a New Form

 

Security researchers at the Checkpoint Research agency discovered a new variant of Banshee malware. Researchers claim that this Banshee malware is to steal browser credentials, cryptocurrency wallet, and other sensitive data from macOS users. 

 

Checkpoint Research wrote a blog post about the gravity of Banshee malware and stated, “This stealthy malware doesn’t just infiltrate; it operates undetected, blending seamlessly with normal system processes. Even seasoned IT professionals struggle to identify its presence. Banshi stealer isn’t just another piece of malware–it’s a critical warning for users to reassess their security assumptions and take proactive measures to safeguard their data.”

 

Banshee stealer was first discovered in 2024. It was publicised as a “stealer-as-a-service” on XSS, Exploit, and Telegram, where cyber attackers could purchase this malware. In September 2024, a new version of Banshee was discovered, which could evade detection. It stole a string encryption algorithm from Apple’s XProtect anti-virus engine. 

 

In November 2024, Banshee’s source code was leaked, allowing antivirus makers to prepare for the malware. This resulted in better detection and awareness of new variants of malware. 

 

The latest Banshee variant attacks browsers, such as Chrome, Brave, Edge, etc., alongside their extensions. It also exploits a Two-Factor Authentication to take over credentials. 

 

Ms Ngoc Bui, a cybersecurity veteran at Menlo Security, said users need a multi-layered approach to security that includes highly trained hunters on Mac. Restricting access and ensuring that permissions are only granted when necessary can help users evade threats like Banshee. 

 

Related tags

About author


Related Posts

How To Dual Boot Linux And Windows: Step By Step Guide

by Shipra Prajapati 8 hours ago

Dual Boot Linux allows you to run Linux and another operating system on one computer. Here, we share the process of booting Linux and Windows dual.

Avast One Review: Top-Tier Protection For Your Computer

by Jyoti Singh 2 days ago

This Avast One review covers the software’s features, like PC utilities, customer support, an easy-to-use interface, and subscription plans.

Gmail Warns Its 2.5 Billion Users About AI Hacking

by Gopal Tiwari 4 days ago

Gmail alerted its 2.5 billion users about AI-driven scams. In this new technique, the cybercriminals pretend to belong to the Google support team.

Government’s Chrome Warning for Windows and Mac Users

by Vipin Kumar 11 days ago

The government has issued a Google Chrome warning for Windows and Mac users. CERT-In has identified two critical vulnerabilities in the Chrome browser.

A Genuine iQOO 13 Review: Unveiling The Major Features

by Shipra Prajapati 14 days ago

Here, we have a genuine iQOO 13 review for you, including its technical specifications and features. Find out what this phone offers in the blog.

Mastering Email Tracking In Gmail: Step By Step

by Vipin Kumar 16 days ago

Email Tracking In Gmail saves time, helps write better emails, and boosts the campaign. Here, we have shared steps on how to track emails.

menu
menu