Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

The ransomware in question, KeRanger, is believed to be the first completed ransomware to exist on the OS X operating system. In 2014, Kaspersky Labs discovered an incomplete form of ransomware for the Mac platform, but it didn’t pose an immediate threat. Now, however, KeRanger marks the beginning of more dangerous threats finally making their way to Apple’s operating systems.

To make matters worse, this ransomware is spread through a torrenting software called Transmission, which is designed to share files. Though torrenting software has a bad reputation for distributing pirated content, like copyrighted films, tv shows, music, and much more, it has plenty of legitimate uses, as well.

As explained by CNet:

If a user installed one of the infected versions of Transmission, an executable file embedded within the software would run on the system. At first, there'd be no sign of a problem. But after three days, KeRanger would connect with servers over the anonymous Tor network and begin encrypting certain files on the Mac's system.

Researchers have concluded that KeRanger is still under development, and is seeking a way to also encrypt the victim’s backup data. In many cases, restoring a backup of your system’s data is the only way to remove ransomware. Thus, KeRanger is taking a significant step toward making it virtually impossible to recover your data without paying the ransom.

In response to the threat, Apple has revoked the security certificate that KeRanger takes advantage of, and has updated its XProtect antivirus software. Transmission has also removed the infected versions of its installer from its website. Still, those who already have unknowingly downloaded the Transmission installer between March 4th and 5th 2016 may be affected by KeRanger. If you want to know more about how to identify if you’re affected by KeRanger, you can review how to protect yourself on Palo Alto Networks’ site.

As is the case with most other ransomware, decrypting the files on your own is nearly impossible. This is how hackers make their money off of ransomware; they play to the fear that users won’t be getting their data back. This is the reason why we always advocate that you take preventative steps to lessen the chances of your data falling victim to ransomware. Implementing a solid security solution is a great way to do so, and you should generally avoid torrenting files in the office anyway; it’s especially important that your employees understand this, too.

In the case of ransomware, the most important thing to remember is that you need to prevent your systems from getting infected before anything else. Otherwise, you risk everything. To make sure your systems are properly protected, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 30 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Backup Passwords Saving Money Communication Productivity Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI VoIP Business Management Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Automation Facebook Information Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Managed Service Provider Remote Work Server Compliance Outsourced IT Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Business Technology Blockchain Virtualization Wi-Fi Vendor Apps Data Security Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Apple Tip of the week App Employer-Employee Relationship Networking Managed Services Voice over Internet Protocol BYOD Access Control WiFi HIPAA Applications Computing How To BDR Information Technology Hacker Conferencing Avoiding Downtime Office 365 Marketing Augmented Reality Virtual Private Network Storage Password Health Bring Your Own Device Big Data Retail 2FA Router Operating System Managed IT Services Help Desk Risk Management Computers Healthcare Website Office Tips Analytics Windows 7 Display Printer Microsoft 365 Firewall Cooperation Paperless Office Infrastructure Solutions The Internet of Things Document Management Windows 11 Going Green Social Scam Excel Data loss Cybercrime Customer Service Monitoring Remote Workers Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Telephone Physical Security Images 101 Money Word Licensing Humor Multi-Factor Authentication Mobility Computer Repair Entertainment Sports Mouse Employees Safety Telephone System Machine Learning Administration Integration Cost Management Holidays Maintenance Antivirus Supply Chain Settings Data Storage Printing User Tip Modem Wireless Content Filtering Mobile Security Video Conferencing Processor Customer Relationship Management Managed Services Provider Virtual Machines YouTube Professional Services Cryptocurrency Smart Technology Hacking Robot Presentation Saving Time Virtual Desktop iPhone Data storage LiFi Wireless Technology Data Privacy Managed IT Service Vulnerabilities IT Management VPN Meetings Outlook Downloads Break Fix Shortcuts IT Assessment Browsers Hard Drives Connectivity Domains Value Upload Point of Sale Ransmoware Flexibility Vendors Organization Hacks Social Network Scary Stories Multi-Factor Security Dark Web Tech Support Digital Security Cameras Be Proactive Smart Devices Refrigeration IoT Network Management Fun Deep Learning Public Speaking Memory Trends Monitors Workforce Remote Working Threats Lithium-ion battery Data Breach Customer Resource management Google Play Regulations Google Calendar Entrepreneur Microsoft Excel Websites Videos Workplace Strategies Electronic Health Records Data Analysis Education Star Wars Wasting Time Gamification Staff Meta Amazon Mobile Computing Trend Micro SharePoint Security Cameras Social Networking Legislation Electronic Medical Records Search Software as a Service Fileless Malware Undo Best Practice Managing Costs Content Lenovo Wearable Technology Writing Outsource IT Environment Media eCommerce Health IT Buisness SSID Motherboard Comparison Virtual Reality Server Management Permissions Private Cloud Legal Surveillance Directions IT solutions Virtual Assistant Assessment Business Growth Virtual Machine Superfish Identity Theft Small Businesses Twitter Displays Reviews Application Medical IT Specifications Internet Exlporer Cortana Fraud Error Development Microchip Transportation Alt Codes IBM Hypervisor Username Social Engineering Outsourcing Black Friday Remote Computing Shopping Optimization Downtime PowerPoint Database Workplace Hosted Solution Employer/Employee Relationships Typing Navigation IT Technicians Tablet Hiring/Firing PCI DSS Cyber Monday Alert Gig Economy Paperless Proxy Server Cookies Tactics Managed IT Knowledge Hotspot File Sharing Dark Data Google Drive Co-managed IT Internet Service Provider Competition Teamwork Regulations Compliance Evernote Mirgation How To Technology Care Notifications Business Communications Memes Nanotechnology 5G SQL Server Addiction Experience Language Travel Google Docs Scams Net Neutrality Unified Communications Financial Data Bitcoin History Management Techology Running Cable User Chatbots Google Maps Hybrid Work Distributed Denial of Service Smartwatch Google Wallet Human Resources IT Screen Reader Azure Service Level Agreement Computing Infrastructure Unified Threat Management Cables Procurement Telework Windows 8 IP Address Cyber security Unified Threat Management Laptop Tech Identity CES Drones Google Apps Communitications Bookmark Smart Tech Download Alerts Network Congestion IT Maintenance Supply Chain Management Business Intelligence FinTech User Error Halloween Recovery Term

Blog Archive