Banshee Strikes Back: Mac Malware Adopts Apple Techniques for Stealthy Data Theft
Banshee info-stealing malware has been slipping past macOS defenses by adopting encryption from Apple’s XProtect. This sneaky trick makes it blend in with regular system operations, all while collecting sensitive data. The malware, once a $3,000 stealer-as-a-service, is now roaming free thanks to leaked source code.

Hot Take:
Who knew Banshees could be so sly? This info-stealer’s got more tricks up its sleeve than a magician at a cybersecurity conference. And by adopting Apple’s own XProtect encryption, it’s like wearing a disguise made from the enemy’s uniforms. Sneaky, sneaky!
Key Points:
- Banshee malware adopts Apple’s XProtect encryption to evade detection on macOS systems.
- Originally a stealer-as-a-service priced at $3,000, its source code was leaked, leading to shutdown and further adaptations.
- Recent Banshee variants target macOS users via deceptive GitHub repositories.
- Collects sensitive data including passwords, browser data, and system information.
- New variants no longer avoid Russian systems, expanding their target pool.
Already a member? Log in here