Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

The ransomware in question, KeRanger, is believed to be the first completed ransomware to exist on the OS X operating system. In 2014, Kaspersky Labs discovered an incomplete form of ransomware for the Mac platform, but it didn’t pose an immediate threat. Now, however, KeRanger marks the beginning of more dangerous threats finally making their way to Apple’s operating systems.

To make matters worse, this ransomware is spread through a torrenting software called Transmission, which is designed to share files. Though torrenting software has a bad reputation for distributing pirated content, like copyrighted films, tv shows, music, and much more, it has plenty of legitimate uses, as well.

As explained by CNet:

If a user installed one of the infected versions of Transmission, an executable file embedded within the software would run on the system. At first, there'd be no sign of a problem. But after three days, KeRanger would connect with servers over the anonymous Tor network and begin encrypting certain files on the Mac's system.

Researchers have concluded that KeRanger is still under development, and is seeking a way to also encrypt the victim’s backup data. In many cases, restoring a backup of your system’s data is the only way to remove ransomware. Thus, KeRanger is taking a significant step toward making it virtually impossible to recover your data without paying the ransom.

In response to the threat, Apple has revoked the security certificate that KeRanger takes advantage of, and has updated its XProtect antivirus software. Transmission has also removed the infected versions of its installer from its website. Still, those who already have unknowingly downloaded the Transmission installer between March 4th and 5th 2016 may be affected by KeRanger. If you want to know more about how to identify if you’re affected by KeRanger, you can review how to protect yourself on Palo Alto Networks’ site.

As is the case with most other ransomware, decrypting the files on your own is nearly impossible. This is how hackers make their money off of ransomware; they play to the fear that users won’t be getting their data back. This is the reason why we always advocate that you take preventative steps to lessen the chances of your data falling victim to ransomware. Implementing a solid security solution is a great way to do so, and you should generally avoid torrenting files in the office anyway; it’s especially important that your employees understand this, too.

In the case of ransomware, the most important thing to remember is that you need to prevent your systems from getting infected before anything else. Otherwise, you risk everything. To make sure your systems are properly protected, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 03 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Efficiency User Tips Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Backup Cybersecurity Microsoft Communication Passwords Saving Money Data Backup Smartphone Android Managed Service Business Management Smartphones VoIP Upgrade communications Mobile Devices Disaster Recovery Data Recovery Browser Social Media Productivity Windows Managed IT Services Microsoft Office AI Current Events Remote Tech Term Network Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Gadgets Information Remote Work Training Miscellaneous Server Managed Service Provider Outsourced IT Employee/Employer Relationship Spam Compliance Encryption Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Business Technology IT Support Bandwidth Blockchain Vendor Two-factor Authentication Apps Data Security Mobile Office Mobile Device Management BYOD Gmail Chrome Employer-Employee Relationship Managed Services Budget Voice over Internet Protocol Apple Networking App HIPAA Computing Applications Information Technology WiFi Access Control Office 365 Tip of the week Conferencing Hacker How To Avoiding Downtime BDR Marketing Operating System Router Virtual Private Network Risk Management Big Data Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Computers Bring Your Own Device Managed IT Services Website Remote Monitoring End of Support Vulnerability Solutions Firewall Vendor Management Cybercrime Physical Security Display Printer The Internet of Things Windows 11 Paperless Office Infrastructure Social Monitoring 2FA Excel Document Management Remote Workers Customer Service Telephone Scam Data loss Free Resource Cooperation Project Management Windows 7 Going Green Patch Management Microsoft 365 Save Money Settings Wireless Printing Content Filtering IT Management YouTube Meetings Employees VPN Integration Safety Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Supply Chain Smart Technology Video Conferencing Outlook Machine Learning Managed Services Provider Money Saving Time Professional Services Virtual Machines Humor Customer Relationship Management Managed IT Service Maintenance Hacking Sports Downloads Antivirus Mouse iPhone Presentation Licensing Entertainment Vulnerabilities Wireless Technology Administration Data Privacy Images 101 Robot Multi-Factor Authentication Telephone System Mobility Cost Management Word Remote Working Memory Vendors Alt Codes Content Wearable Technology Google Play Be Proactive Refrigeration Downtime Unified Threat Management Motherboard Comparison Data Breach Health IT Electronic Health Records Unified Threat Management Directions Workforce Public Speaking Hosted Solution Assessment Permissions Videos Wasting Time Threats Lithium-ion battery Typing Security Cameras Workplace Strategies Entrepreneur Network Congestion Specifications Trend Micro Software as a Service Google Drive User Error Microchip Meta Internet Exlporer Knowledge Fraud Managing Costs Amazon Username SSID Undo Point of Sale 5G Black Friday eCommerce Surveillance Google Docs Virtual Assistant Outsource IT Unified Communications Database Experience Running Cable Tech Support IT Technicians Virtual Machine Environment Bitcoin Network Management Media Google Wallet Proxy Server Medical IT Cookies Monitors Cyber Monday Reviews Development Transportation Small Businesses Tactics Hotspot Laptop Websites Mirgation Hypervisor Displays Windows 8 Application Drones PowerPoint Nanotechnology Shopping Optimization SharePoint Employer/Employee Relationships Outsourcing IBM Addiction Electronic Medical Records Language Halloween Chatbots PCI DSS Management Navigation Lenovo Workplace Screen Reader Writing Distributed Denial of Service Gig Economy Internet Service Provider Teamwork Hiring/Firing Service Level Agreement Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Regulations Compliance Hacks Server Management Evernote Paperless Superfish Bookmark Co-managed IT Competition Identity Theft Smart Tech Fun Memes Net Neutrality SQL Server Technology Care Deep Learning Download Twitter Alerts Error Financial Data History Business Communications Browsers Scams Education Connectivity Social Engineering Break Fix Smartwatch IT Procurement Azure Hybrid Work Upload User Remote Computing Multi-Factor Security Telework Cyber security Mobile Computing Social Network Tech Human Resources Cables Tablet IoT Search Dark Web CES Communitications Supply Chain Management IP Address Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar FinTech Managed IT Customer Resource management Term Google Apps Legal Data Analysis IT Maintenance IT solutions Star Wars How To Microsoft Excel IT Assessment Flexibility Value Business Intelligence Business Growth Gamification Recovery Notifications Staff Hard Drives Travel Social Networking Legislation Organization Shortcuts Smart Devices Techology Fileless Malware Ransmoware Domains Google Maps Cortana Digital Security Cameras

Blog Archive