Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

The ransomware in question, KeRanger, is believed to be the first completed ransomware to exist on the OS X operating system. In 2014, Kaspersky Labs discovered an incomplete form of ransomware for the Mac platform, but it didn’t pose an immediate threat. Now, however, KeRanger marks the beginning of more dangerous threats finally making their way to Apple’s operating systems.

To make matters worse, this ransomware is spread through a torrenting software called Transmission, which is designed to share files. Though torrenting software has a bad reputation for distributing pirated content, like copyrighted films, tv shows, music, and much more, it has plenty of legitimate uses, as well.

As explained by CNet:

If a user installed one of the infected versions of Transmission, an executable file embedded within the software would run on the system. At first, there'd be no sign of a problem. But after three days, KeRanger would connect with servers over the anonymous Tor network and begin encrypting certain files on the Mac's system.

Researchers have concluded that KeRanger is still under development, and is seeking a way to also encrypt the victim’s backup data. In many cases, restoring a backup of your system’s data is the only way to remove ransomware. Thus, KeRanger is taking a significant step toward making it virtually impossible to recover your data without paying the ransom.

In response to the threat, Apple has revoked the security certificate that KeRanger takes advantage of, and has updated its XProtect antivirus software. Transmission has also removed the infected versions of its installer from its website. Still, those who already have unknowingly downloaded the Transmission installer between March 4th and 5th 2016 may be affected by KeRanger. If you want to know more about how to identify if you’re affected by KeRanger, you can review how to protect yourself on Palo Alto Networks’ site.

As is the case with most other ransomware, decrypting the files on your own is nearly impossible. This is how hackers make their money off of ransomware; they play to the fear that users won’t be getting their data back. This is the reason why we always advocate that you take preventative steps to lessen the chances of your data falling victim to ransomware. Implementing a solid security solution is a great way to do so, and you should generally avoid torrenting files in the office anyway; it’s especially important that your employees understand this, too.

In the case of ransomware, the most important thing to remember is that you need to prevent your systems from getting infected before anything else. Otherwise, you risk everything. To make sure your systems are properly protected, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Google Privacy Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Mobile Devices communications Managed Service Upgrade Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Tech Term Remote Network Internet of Things Current Events Facebook Productivity Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing AI Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Information Holiday Encryption Employee/Employer Relationship Spam Compliance Office Windows 10 Data Management Business Continuity Government Training Bandwidth Virtualization Blockchain Wi-Fi Business Technology Windows 10 Data Security Apps Two-factor Authentication Mobile Office Gmail Budget Apple Networking App Employer-Employee Relationship BYOD Vendor Managed Services Voice over Internet Protocol Mobile Device Management Chrome Conferencing WiFi How To BDR Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 IT Support Tip of the week Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System HIPAA Computers Router Virtual Private Network Risk Management Website Healthcare Health Help Desk Analytics Office Tips Augmented Reality Windows 7 Telephone Microsoft 365 The Internet of Things Scam Data loss Solutions Social Cooperation Going Green Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Customer Service 2FA Vendor Management Cybercrime Excel Physical Security Display Printer Remote Workers Paperless Office Infrastructure Monitoring Firewall Free Resource Document Management Project Management Images 101 Managed IT Service Mobility Safety Multi-Factor Authentication Maintenance Antivirus Sports Downloads Mouse Licensing Entertainment Administration Employees Integration Telephone System Robot Customer Relationship Management Cost Management Settings Holidays Printing Wireless Data Storage Content Filtering Supply Chain Hacking IT Management Presentation Video Conferencing VPN YouTube Meetings Managed Services Provider Professional Services Virtual Machines Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi iPhone Word Smart Technology Outlook Vulnerabilities Machine Learning Money Saving Time Data Privacy Humor IT Assessment Hacks Server Management Entrepreneur IT Maintenance Scary Stories Private Cloud Identity Flexibility Superfish Bookmark Value Business Intelligence Identity Theft Smart Tech Fun Shortcuts Twitter Alerts Organization Deep Learning Download Undo Smart Devices Ransmoware Error Digital Security Cameras Remote Working Browsers Memory Vendors Education Connectivity Social Engineering Break Fix Google Play Be Proactive Remote Computing Data Breach Upload Electronic Health Records Mobile Computing Social Network Workforce Multi-Factor Security Videos Wasting Time Threats Tablet IoT Search Dark Web Security Cameras Workplace Strategies Alert Application Trend Micro Best Practice Trends Software as a Service Managed IT Customer Resource management Meta Buisness File Sharing Regulations Dark Data Google Calendar IBM Legal Data Analysis Managing Costs Amazon IT solutions Star Wars How To Microsoft Excel SSID Notifications Staff eCommerce Business Growth Gamification Surveillance Virtual Assistant Outsource IT Travel Social Networking Legislation Techology Fileless Malware Virtual Machine Environment Google Maps Media Cortana Medical IT Wearable Technology Reviews Alt Codes Content Competition Development Health IT Transportation Small Businesses Downtime Unified Threat Management Motherboard Comparison Unified Threat Management Directions Hypervisor Displays Hosted Solution Assessment Permissions PowerPoint Shopping Optimization Typing Employer/Employee Relationships Outsourcing Network Congestion Specifications PCI DSS Google Drive User Error Microchip User Internet Exlporer Navigation Knowledge Fraud Workplace Gig Economy Username Internet Service Provider Teamwork Hiring/Firing Point of Sale 5G Black Friday IP Address Regulations Compliance Google Docs Unified Communications Database Evernote Paperless Experience Co-managed IT Running Cable Tech Support IT Technicians Memes Bitcoin Network Management Net Neutrality Google Wallet Proxy Server SQL Server Technology Care Cookies Monitors Cyber Monday Financial Data Recovery History Tactics Business Communications Hotspot Scams Laptop Websites Mirgation Smartwatch Hard Drives IT Windows 8 Domains Procurement Drones Azure Hybrid Work Nanotechnology Telework SharePoint Cyber security Addiction Tech Human Resources Electronic Medical Records Language Cables Halloween Chatbots CES Refrigeration Communitications Management Public Speaking Supply Chain Management Lenovo Screen Reader Writing Distributed Denial of Service Lithium-ion battery FinTech Service Level Agreement Term Google Apps Virtual Reality Computing Infrastructure

Blog Archive