Banshee Stealer malware haunts browser extensions on macOS

Posted:
in macOS edited August 17

Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac.

Browser window showing Apple Insider website, with URL bar, tabs, and a dropdown menu listing several browser extensions including 1Password, Adobe Acrobat, Grammarly, Honey, iCloud Passwords, and LastPass.
Web browser extensions are the target of Banshee Stealer on macOS



Apple tries hard to make macOS and its other operating systems as secure as possible. While it does what it can to protect us from threats involving third-party malware, browser extensions are always a weak point.

Explained by Elastic Security Labs on Thursday, a malware dubbed Banshee Stealer doesn't directly attack macOS itself, but rather third-party software installed on it, reports Hacker News. This includes a wide range of browsers, including Safari, Chrome, Firefox, Brave, Edge, Vivaldi, Opera, and others.

It also goes after cryptocurrency wallets and over 100 browser extensions installed onto said browsers. This makes it a "highly versatile and dangerous threat," said Elastic Security Labs.

The malware's primary task is to collect and steal data, and so it also has the ability to harvest information about the system itself, along with passwords from the Keychain. Data can also be pulled from a variety of file types stored on the desktop and document folders.

It also has capabilities to try and evade being detected in the first place. It can detect if it's running in a virtual environment, and also uses an API to avoid infecting Macs when Russian is the primary language.

During its installation, the malware makes use of a script to display a fake password prompt to the user, to try and escalate its privilege.

"As macOS increasingly becomes a prime target for cybercriminals, Banshee Stealer underscores the rising observance of macOS-specific malware," the researchers added.

It is unclear how widespread the malware has been used, but it seems that it is viewed as a high-quality tool for cybercriminals by its creator. In one forum screenshot, a seller of the tool has priced access to it at $3,000 per month.

To macOS users, there's no specific instructions to help this particular attack vector, other than good computing hygiene. Ensuring you know downloads come from legitimate sources, being wary about unexpected email attachments, and being more thoughtful about installations will take many users far.



Read on AppleInsider

Comments

  • Reply 1 of 6
    from the linked article - "The web browsers and crypto wallets targeted by the malware comprise Google Chrome, Mozilla Firefox, Brave, Microsoft Edge, Vivaldi, Yandex, Opera, OperaGX, Exodus, Electrum, Coinomi, Guarda, Wasabi Wallet, Atomic, and Ledger."

    Safari appears to be unaffected judging by the glaring omission.
    Fred257thtwatto_cobra
  • Reply 2 of 6
    What does the osascript fake password prompt look like? I guess it’s just low tech gimmi your password…
    watto_cobra
  • Reply 3 of 6
    What does the osascript fake password prompt look like? I guess it’s just low tech gimmi your password…
    It looks like any other password prompt. There are many ways to trigger one. IIRC a bash script with "sudo" in it, will trigger one
    appleinsideruser
  • Reply 4 of 6
    gatorguygatorguy Posts: 24,534member
    lotones said:
    from the linked article - "The web browsers and crypto wallets targeted by the malware comprise Google Chrome, Mozilla Firefox, Brave, Microsoft Edge, Vivaldi, Yandex, Opera, OperaGX, Exodus, Electrum, Coinomi, Guarda, Wasabi Wallet, Atomic, and Ledger."

    Safari appears to be unaffected judging by the glaring omission.
    Yes, Safari is also affected.

    The quote used in this AI article was truncated. 
    "The web browsers and crypto wallets targeted by the malware comprise Safari, Google Chrome, Mozilla Firefox, Brave, Microsoft Edge, Vivaldi, Yandex, Opera, OperaGX, Exodus, Electrum, Coinomi, Guarda, Wasabi Wallet, Atomic, and Ledger."

    No idea how reference to Safari managed to be left out.
    https://thehackernews.com/2024/08/new-banshee-stealer-targets-100-browser.html
    edited August 17 lotonesmuthuk_vanalingamOctoMonkey
  • Reply 5 of 6
    gatorguy said:
    lotones said:
    from the linked article - "The web browsers and crypto wallets targeted by the malware comprise Google Chrome, Mozilla Firefox, Brave, Microsoft Edge, Vivaldi, Yandex, Opera, OperaGX, Exodus, Electrum, Coinomi, Guarda, Wasabi Wallet, Atomic, and Ledger."

    Safari appears to be unaffected judging by the glaring omission.
    Yes, Safari is also affected.

    The quote used in this AI article was truncated. 
    "The web browsers and crypto wallets targeted by the malware comprise Safari, Google Chrome, Mozilla Firefox, Brave, Microsoft Edge, Vivaldi, Yandex, Opera, OperaGX, Exodus, Electrum, Coinomi, Guarda, Wasabi Wallet, Atomic, and Ledger."

    No idea how reference to Safari managed to be left out.
    https://thehackernews.com/2024/08/new-banshee-stealer-targets-100-browser.html
    Thanks for the clarification.
  • Reply 6 of 6
    lostkiwilostkiwi Posts: 640member
    gatorguy said:
    lotones said:
    from the linked article - "The web browsers and crypto wallets targeted by the malware comprise Google Chrome, Mozilla Firefox, Brave, Microsoft Edge, Vivaldi, Yandex, Opera, OperaGX, Exodus, Electrum, Coinomi, Guarda, Wasabi Wallet, Atomic, and Ledger."

    Safari appears to be unaffected judging by the glaring omission.
    Yes, Safari is also affected.

    The quote used in this AI article was truncated. 
    "The web browsers and crypto wallets targeted by the malware comprise Safari, Google Chrome, Mozilla Firefox, Brave, Microsoft Edge, Vivaldi, Yandex, Opera, OperaGX, Exodus, Electrum, Coinomi, Guarda, Wasabi Wallet, Atomic, and Ledger."

    No idea how reference to Safari managed to be left out.
    https://thehackernews.com/2024/08/new-banshee-stealer-targets-100-browser.html
    In the Elastic article the article pulls from it states:

    "BANSHEE collects data from 9 different browsers currently, including browser history, cookies, logins, etc:
    • Chrome
    • Firefox
    • Brave
    • Edge
    • Vivaldi
    • Yandex
    • Opera
    • OperaGX

    Regarding Safari, only the cookies are collected by the AppleScript script for the current version."

    I imagine that could be why the article's author phrased that way.

Sign In or Register to comment.