Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

The ransomware in question, KeRanger, is believed to be the first completed ransomware to exist on the OS X operating system. In 2014, Kaspersky Labs discovered an incomplete form of ransomware for the Mac platform, but it didn’t pose an immediate threat. Now, however, KeRanger marks the beginning of more dangerous threats finally making their way to Apple’s operating systems.

To make matters worse, this ransomware is spread through a torrenting software called Transmission, which is designed to share files. Though torrenting software has a bad reputation for distributing pirated content, like copyrighted films, tv shows, music, and much more, it has plenty of legitimate uses, as well.

As explained by CNet:

If a user installed one of the infected versions of Transmission, an executable file embedded within the software would run on the system. At first, there'd be no sign of a problem. But after three days, KeRanger would connect with servers over the anonymous Tor network and begin encrypting certain files on the Mac's system.

Researchers have concluded that KeRanger is still under development, and is seeking a way to also encrypt the victim’s backup data. In many cases, restoring a backup of your system’s data is the only way to remove ransomware. Thus, KeRanger is taking a significant step toward making it virtually impossible to recover your data without paying the ransom.

In response to the threat, Apple has revoked the security certificate that KeRanger takes advantage of, and has updated its XProtect antivirus software. Transmission has also removed the infected versions of its installer from its website. Still, those who already have unknowingly downloaded the Transmission installer between March 4th and 5th 2016 may be affected by KeRanger. If you want to know more about how to identify if you’re affected by KeRanger, you can review how to protect yourself on Palo Alto Networks’ site.

As is the case with most other ransomware, decrypting the files on your own is nearly impossible. This is how hackers make their money off of ransomware; they play to the fear that users won’t be getting their data back. This is the reason why we always advocate that you take preventative steps to lessen the chances of your data falling victim to ransomware. Implementing a solid security solution is a great way to do so, and you should generally avoid torrenting files in the office anyway; it’s especially important that your employees understand this, too.

In the case of ransomware, the most important thing to remember is that you need to prevent your systems from getting infected before anything else. Otherwise, you risk everything. To make sure your systems are properly protected, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 05 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Employer-Employee Relationship BYOD Chrome Tip of the week Budget Mobile Device Management Gmail Apple Voice over Internet Protocol App WiFi Networking BDR Computing HIPAA Information Technology Applications Physical Security Hacker Office 365 Avoiding Downtime Access Control Marketing Conferencing Password Managed IT Services How To Operating System Router Risk Management Computers Virtual Private Network Analytics Office Tips Health Help Desk Website Augmented Reality Storage Retail Bring Your Own Device 2FA Big Data Healthcare Social Patch Management Save Money Cybercrime Remote Monitoring Free Resource End of Support Vulnerability Project Management Windows 7 Vendor Management Customer Service Microsoft 365 Display Solutions Printer Monitoring Paperless Office Infrastructure Document Management Managed IT Service Firewall Telephone Windows 11 Scam Data loss The Internet of Things Cooperation Excel Remote Workers Going Green iPhone Telephone System Settings Cost Management Wireless Printing Robot Content Filtering Vulnerabilities YouTube Customer Relationship Management Cryptocurrency Images 101 IT Management Data Privacy VPN Multi-Factor Authentication Meetings Mobility Modem User Tip Hacking Processor Virtual Desktop Presentation Mobile Security Data storage LiFi Computer Repair Wireless Technology Outlook Employees Smart Technology Integration Money Humor Saving Time Word Machine Learning Holidays Sports Data Storage Mouse Downloads Video Conferencing Maintenance Administration Antivirus Licensing Managed Services Provider Professional Services Safety Virtual Machines Supply Chain Entertainment Legislation How To Paperless Alt Codes Smartwatch Application Social Networking IT Procurement Azure Notifications Co-managed IT Fileless Malware Downtime Technology Care Hosted Solution IBM Content Telework Wearable Technology Cyber security Travel Tech Google Maps Comparison Business Communications Typing Health IT CES Techology Motherboard Communitications Assessment Supply Chain Management Permissions Scams Directions Hybrid Work Google Drive FinTech Knowledge Unified Threat Management Term Specifications Human Resources Unified Threat Management IT Assessment Microchip Competition Internet Exlporer Flexibility 5G Fraud Value Cables Google Docs Network Congestion Unified Communications Username Organization Experience Smart Devices Black Friday Google Apps Bitcoin Digital Security Cameras Running Cable User Error Database Remote Working Memory IT Maintenance Google Wallet Google Play Business Intelligence User IT Technicians Data Breach Point of Sale Cookies Electronic Health Records Cyber Monday Shortcuts Windows 8 Proxy Server Videos Laptop Tactics Network Management Hotspot Wasting Time Tech Support Ransmoware Drones Security Cameras Vendors Monitors IP Address Mirgation Trend Micro Nanotechnology Software as a Service Be Proactive Halloween Addiction Language Managing Costs Websites Workforce SSID Threats Management Recovery Chatbots eCommerce SharePoint Screen Reader Surveillance Distributed Denial of Service Virtual Assistant Electronic Medical Records Workplace Strategies Hacks Scary Stories Hard Drives Domains Service Level Agreement Fun Computing Infrastructure Virtual Machine Meta Medical IT Amazon Writing Deep Learning Reviews Lenovo Identity Refrigeration Smart Tech Development Transportation Virtual Reality Bookmark Education Public Speaking Download Server Management Alerts Hypervisor Private Cloud Outsource IT Identity Theft PowerPoint Environment Media Lithium-ion battery Shopping Superfish Optimization Connectivity Entrepreneur Break Fix Employer/Employee Relationships Twitter Mobile Computing Browsers Upload PCI DSS Search Error Navigation Small Businesses Multi-Factor Security Displays Social Engineering Best Practice Social Network Gig Economy Undo IoT Internet Service Provider Dark Web Teamwork Remote Computing Buisness IT solutions Trends Regulations Compliance Evernote Outsourcing Legal Tablet Google Calendar Business Growth Customer Resource management Regulations Memes Star Wars Net Neutrality Microsoft Excel SQL Server Alert Workplace Data Analysis Dark Data Gamification Financial Data Cortana Managed IT Staff History File Sharing Hiring/Firing

Blog Archive