Banshee Stealer malware targets business data of macOS users

Banshee Stealer malware targets business data of macOS users

/ 03:55 PM January 10, 2025
This shows the Banshee Stealer's login panel.
Figure 1: Banshee login panel 

On January 9, 2025, Check Point Research (CSR) announced that it discovered a more sophisticated version of the Banshee Stealer malware. 

It warned that businesses must be careful as hackers could use it to “compromise sensitive information and damage reputations.” 

READ: AI hacking method steals passwords by listening to keyboards

Article continues after this advertisement

It evades conventional detection methods, allowing it to inflict long-term damage before IT professionals can pinpoint the virus. 

FEATURED STORIES

The Banshee Stealer’s increasing threat

The cybersecurity research group says the public discovered the Banshee MacOS Stealer in mid-2024.

Underground forums advertised it as a “stealer-as-a-service,” which could target Apple computer users for $3,000.

Article continues after this advertisement

In late September, Check Point Research identified a new version that “stole’ a string encryption algorithm from Apple’s official XProtect antivirus engine. 

Article continues after this advertisement

This code replaces the plain text strings in the original version, allowing the Banshee Stealer to evade antivirus engines. 

Article continues after this advertisement

Moreover, cybercriminals distributed this malware via phishing websites and malicious GitHub repositories disguised as popular software tools.

These included Google Chrome, Telegram, and TradingView, and the malware performed the following once it completes installation: 

Article continues after this advertisement
  • Steals system data from internet browsers like Chrome and cryptocurrency wallet extensions
  • Exploits a two-factor authentication (2FA) extension to capture sensitive credentials
  • Collects external IP addresses, macOS passwords, and software and hardware details
  • Tricks users into sharing their macOS passwords
  • Sends stolen information to outside servers via encrypted and encoded files

In November 2024, its source code leaked on XSS underground forums. As a result, antivirus programs improved their Banshee Stealer detection.

However, multiple campaigns continue to distribute the malware through phishing websites. 

In response, businesses and users must bolster their cybersecurity with the latest tools and other proactive methods.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

Learn the Internet safety tips that can reduce your cybersecurity risks here.

TOPICS: malware, technology
TAGS: malware, technology

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2025 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.