Urgent Alert for Apple Users: Banshee Malware Returns

Security researchers at the Checkpoint Research agency discovered a new variant of Banshee malware. Researchers claim that this Banshee malware is to steal browser credentials, cryptocurrency wallet, and other sensitive data from macOS users.
Checkpoint Research wrote a blog post about the gravity of Banshee malware and stated, “This stealthy malware doesn’t just infiltrate; it operates undetected, blending seamlessly with normal system processes. Even seasoned IT professionals struggle to identify its presence. Banshi stealer isn’t just another piece of malware–it’s a critical warning for users to reassess their security assumptions and take proactive measures to safeguard their data.”
Banshee stealer was first discovered in 2024. It was publicised as a “stealer-as-a-service” on XSS, Exploit, and Telegram, where cyber attackers could purchase this malware. In September 2024, a new version of Banshee was discovered, which could evade detection. It stole a string encryption algorithm from Apple’s XProtect anti-virus engine.
In November 2024, Banshee’s source code was leaked, allowing antivirus makers to prepare for the malware. This resulted in better detection and awareness of new variants of malware.
The latest Banshee variant attacks browsers, such as Chrome, Brave, Edge, etc., alongside their extensions. It also exploits a Two-Factor Authentication to take over credentials.
Ms Ngoc Bui, a cybersecurity veteran at Menlo Security, said users need a multi-layered approach to security that includes highly trained hunters on Mac. Restricting access and ensuring that permissions are only granted when necessary can help users evade threats like Banshee.
About author
Jyoti Singh
Hello, my name is Jyoti Singh. I am a content writer by profession but have a keen interest in gadgets. Hope you will like my practical outlook on the latest technological equipment.
How To Dual Boot Linux And Windows: Step By Step Guide
by Shipra Prajapati 8 hours agoDual Boot Linux allows you to run Linux and another operating system on one computer. Here, we share the process of booting Linux and Windows dual.
Avast One Review: Top-Tier Protection For Your Computer
by Jyoti Singh 2 days agoThis Avast One review covers the software’s features, like PC utilities, customer support, an easy-to-use interface, and subscription plans.
Gmail Warns Its 2.5 Billion Users About AI Hacking
by Gopal Tiwari 4 days agoGmail alerted its 2.5 billion users about AI-driven scams. In this new technique, the cybercriminals pretend to belong to the Google support team.
Government’s Chrome Warning for Windows and Mac Users
by Vipin Kumar 11 days agoThe government has issued a Google Chrome warning for Windows and Mac users. CERT-In has identified two critical vulnerabilities in the Chrome browser.
A Genuine iQOO 13 Review: Unveiling The Major Features
by Shipra Prajapati 14 days agoHere, we have a genuine iQOO 13 review for you, including its technical specifications and features. Find out what this phone offers in the blog.
Mastering Email Tracking In Gmail: Step By Step
by Vipin Kumar 16 days agoEmail Tracking In Gmail saves time, helps write better emails, and boosts the campaign. Here, we have shared steps on how to track emails.