A new macOS malware has gained attention, with reports warning of serious risks to millions of users.
Online media outlets like the New York Post and Forbes highlighted concerns raised by cybersecurity firm Check Point, which discovered the malware.
The malware, called Banshee, is designed to steal crypto wallet data and browser credentials. It operated as a $3,000 “stealer-as-a-service” and managed to evade detection for two months by mimicking Apple’s XProtect encryption method.
Did you know?
Subscribe - We publish new crypto explainer videos every week!
How to Pick the Right NFTs? (Animated DOs & DON'Ts)
However, an Apple security expert has argued that the threat may not be as severe as it seems.
Patrick Wardle, a former National Security Agency researcher, believes the media response to Banshee has been exaggerated. While the malware’s encryption appears advanced, he describes its capabilities as simple.
In a January 11 post on X, Wardle explains that the XOR encryption method it used is a common and "basic obfuscation" technique, which makes its similarity to Apple’s encryption method irrelevant.
Wardle emphasizes that focusing on security practices is more effective than worrying about specific malware. He highlights recent changes in macOS security, such as stricter rules for software signing, which further reduce the risk of such attacks.
Additionally, Wardle points out that macOS already blocks threats like this by default. He said, “Out of the box, macOS is going to thwart the majority of malware”.
Meanwhile, crypto hackers recently posed as job recruiters to trick victims into installing malware. How did they pull it off? Read the full story.