Researchers at the cybersecurity firm Check Point reported last week that a new burden of macOS malware allegedly managed to avoid browser detection for more than two months by using an encryption system borrowed from Apple’s protection tools.

Mainstream media outlets responded quickly to the history, with Forbes announcing “real-and-present risks” and the New York Post reciting Check Point on how over 100 million Apple users does “be preyed on.”

But, a scientist at Apple Security believes the condition may be more enthusiasm than reality.

” There’s really nothing special about this particular sample”, Patrick Wardle, CEO of terminal surveillance company DoubleYou, told in an exam via Signal.

While the ransomware appears to pin” software-based crypto cards” and remains a cause of concern, Wardle argues that it has received overwhelming media interest.

The malware, dubbed Banshee, operated as a$ 3, 000″ stealer-as-a-service” targeting crypto wallets and browser credentials. The operation immediately ended in November of last year when the malware’s source code was leaked on secret forums, causing its creators to halt the service.

From soon September through November 2024, Banshee’s smart imitation of Apple’s XProtect browser series encryption engine made it unaffected. &nbsp,

According to the research from Check Point, this tactic allowed it to evade security measures by targeting bitcoin users through phishing websites and GitHub repositories.

Although Wardle describes its primary theft abilities as being somewhat standard, its evasion techniques exhibit sophistication.

For a description, Wardle says, misses a critical technical environment.

“XOR is the most fundamental form of obfuscation”, he explains, referring to the encryption process both Apple and Banshee employed. ” The fact that Banshee used the same method as Apple’s is unimportant”.

Wardle makes the claim that this risk is now automatically blocked by new versions of macOS. ” Out of the box, os is going to block the majority of malware”, he notes. ” There’s basically no threat to the common Mac consumer”.

Wardle, who previously worked for the U.S. National Security Agency, points out that recent changes in mac security have had an impact on how signed or “notarized” ( in Apple’s technical terms ) software is run on a machine.

Wardle advises focusing on basic safety practices rather than any specific malware stress, despite the existence of more advanced threats like zero-day exploits.

” There’s always a balance between protection and usability”, he says. ” Apple walks that range”.

The scenario illustrates how security challenges can be made known to the general public, especially when technical details are lost in translation.

” There are sophisticated malware out there [ …] this isn’t one of them”, Wardle said.

Daily Debrief Newsletter

Start every day with the best news stories right now, plus unique features, a audio, video and more.

Share This Story, Choose Your Platform!