Banshee Stealer Hits macOS Customers by way of Pretend GitHub Repositories

SUMMARY

  • Banshee Stealer targets macOS customers, distributed by way of pretend GitHub repositories and phishing websites.
  • The malware steals browser credentials, cryptocurrency wallets, 2FA codes, and system particulars.
  • It evades detection utilizing Apple’s XProtect algorithm and misleading system pop-ups.
  • Risk actors expanded targets by eradicating regional restrictions within the malware.
  • Supply code leaked in November 2024, however dangers stay with evolving cyber threats.

Cybersecurity researchers at Verify Level detected a brand new model of Banshee Stealer in late September 2024, distributed by way of phishing web sites and pretend GitHub repositories. Based on their investigation, shared solely with Hackread.com this infostealer resembles standard software program like Google Chrome, Telegram, and TradingView.

In your info, Banshee macOS Stealer targets macOS customers and steals browser credentials, cryptocurrency wallets, and different delicate knowledge. It was first detected by Elastic Safety Labs in August 2024 and was marketed on underground boards like XSS, Exploit, and Telegram, as a “stealer-as-a-service”. 

This newly found model features a string encryption algorithm “stolen” from Apple’s personal XProtect antivirus engine, which allowed it to evade detection for over two months. As well as, it doesn’t embrace its Russian language examine, which was beforehand used to forestall the malware from concentrating on particular areas, indicating an enlargement in its potential targets.

Verify Level has recognized a number of campaigns distributing the malware by means of phishing web sites, though it’s unclear if they’re carried out by earlier prospects. Risk actors utilized GitHub repositories for Banshee distribution, concentrating on macOS customers with Banshee and Home windows customers with Lumma Stealer. Malicious repositories had been created over three waves, showing official with stars and opinions, and luring customers into downloading malware

Screenshot by way of CPR

Banshee Stealer can harvest knowledge from internet browsers, cryptocurrency wallets, and information with particular extensions, together with stealing login credentials from internet browsers like Chrome, Courageous, Edge, and Vivaldi. It additionally targets browser extensions, particularly these for cryptocurrency wallets, probably compromising your digital property.

Moreover, it may seize your Two-Issue Authentication (2FA) credentials, bypassing an additional layer of safety on your accounts. Moreover, it drains off software program and {hardware} particulars out of your machine, alongside along with your exterior IP tackle and macOS passwords, giving attackers a whole image of your system.

Additionally, Banshee Stealer makes use of misleading pop-ups that mimic official system prompts. These pop-ups can trick you into unknowingly revealing your macOS password, granting the malware administrative entry to your system. The malware employs anti-analysis strategies to keep away from detection by safety instruments.

This makes it troublesome to establish its presence in your machine utilizing conventional strategies. As soon as stolen, your knowledge is shipped to the attacker’s command-and-control servers by means of encrypted and encoded channels, making it difficult to trace or intercept. Its supply code leaked on-line in November 2024, resulting in its shutdown. Nonetheless, it highlights how cyber threats are evolving frequently. 

“Businesses must recognize the broader risks posed by modern malware, including costly data breaches that compromise sensitive information and damage reputations, targeted attacks on cryptocurrency wallets that threaten digital assets, and operational disruptions caused by stealthy malware that evades detection and inflicts long-term harm before being identified,” CPR researchers famous within the weblog put up.

Ms. Ngoc Bui, Cybersecurity Professional at Menlo Safety, a Mountain View, Calif.-based supplier of browser safety commented on the latatest improvement stating, This new Banshee Stealer variant exposes a vital hole in Mac safety. Whereas firms are more and more adopting Apple ecosystems, the safety instruments haven’t stored tempo. Even main EDR options have limitations on Macs, leaving organizations with important blind spots. We want a multi-layered method to safety, together with extra educated hunters on Mac environments.

  1. Pretend Google Meet Alerts Set up Malware on Home windows, macOS
  2. “HM Surf” macOS Flaw Lets Attackers Entry Digital camera and Mic
  3. Hackers Might Exploit Microsoft Groups on macOS to Steal Information
  4. TodoSwift Malware Targets macOS, Disguised as Bitcoin PDF App
  5. Lazarus Group Hits macOS with RustyAttr Trojan in Pretend Job PDFs

Recent articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

Jan 17, 2025Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...