A new type of malware specifically targeting macOS, known as Banshee Stealer has surfaced recently. It aims at a variety of browsers, cryptocurrency wallets and, over 100 browser extensions. The cybersecurity experts at Elastic Security Labs have labeled Banshee Stealer as an serious threat for purchase on the dark web at a steep price of $3,000 per month.
Banshee Stealer is crafted to exploit both x86_64 and ARM64 architectures posing a risk to Apples macOS systems. This malicious software goes after web browsers like Safari, Google Chrome, Mozilla Firefox, Brave, Microsoft Edge among others. Moreover it targets cryptocurrency wallets such, as Exodus, Electrum and Ledger. Furthermore Banshee Stealer can extract information from iCloud Keychain passwords and Notes.
Advanced Evasion Techniques
To avoid getting caught Banshee Stealer uses methods to prevent analysis and debugging like checking for environments. This malicious software also makes use of the CFLocaleCopyPreferredLanguages API to stay away, from systems with Russian as their language. Similar to types of malware for macOS Banshee Stealer uses osascript to show a password prompt fooling users into giving away their system passwords for gaining higher privileges.
The rise in macOS malware, such as Banshee Stealer emphasizes the increasing need for security measures, on Apple devices. With cybercriminals creating threats aimed at macOS users it’s essential for both individuals and organizations to stay alert keep their systems updated and use comprehensive security solutions to guard against data breaches and other harmful actions.