Researchers have discovered a new information-stealing malware called Banshee Stealer that specifically targets Apple computers running on macOS. The malware was first spotted in August and is available as a service for $3,000 per month.
While not overly complex in its design, Banshee Stealer’s focus on macOS systems and the variety of data it collects make it a significant threat. The malware can collect user passwords, files from the Desktop and Documents folders, browser history, cookies, and logins from nine different browsers, including Chrome, Firefox, Edge, and Opera.
Notably, Banshee Stealer can also gain access to victims’ cryptocurrency wallets, including Wasabi Wallet, Exodus, and Ledger. After collecting data, the malware ZIP compresses it and encrypts the temporary folder.
The high price of $3,000 per month for Banshee Stealer is likely linked to the growing interest in macOS-specific malicious tools among cybercriminals, making it more lucrative than Windows-based stealers like AgentTesla, which costs nearly $50 per month.
Despite its potentially dangerous capabilities, the malware’s lack of sophisticated obfuscation and debug information make it easier for analysts to dissect and understand. However, this malware presents a severe risk to macOS users, targeting vital system information.
Source: https://therecord.media/apple-macos-infostealer-banshee-stealer