Mac ransomware

  • Thread starter Deleted User
  • Start date
  • Views 2,998
  • Replies 33
D

Deleted User

Guest
OP
On Facebook there's been a trending article today about the first known ransomware for Mac computers. Some of the files on the computer get encrypted and you have to pay the hackers 280 pounds to access them again.

My questions are, why not just pay the money and then ask your credit card company to do a chargeback or reverse the transaction? Wouldn't it be easy for the guys doing this to be traced when they try to spend or withdraw the money?

And if you're wondering, yes, I am a tech retard.
 

Touko White

(not)Banned
Member
Joined
Jan 12, 2016
Messages
687
Trophies
0
XP
750
Country
United Kingdom
How can you get infected by this? Is it through downloading crap software, or are there other ways to catch it, as well?
I don't need to lose my passwords.
 

Xenon Hacks

Well-Known Member
Member
Joined
Nov 13, 2014
Messages
7,414
Trophies
1
Age
30
XP
4,687
Country
United States
On Facebook there's been a trending article today about the first known ransomware for Mac computers. Some of the files on the computer get encrypted and you have to pay the hackers 280 pounds to access them again.

My questions are, why not just pay the money and then ask your credit card company to do a chargeback or reverse the transaction? Wouldn't it be easy for the guys doing this to be traced when they try to spend or withdraw the money?

And if you're wondering, yes, I am a tech retard.
Most if not all of the time people pay but no unlock happens.
 
  • Like
Reactions: Bubsy Bobcat

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,321
Country
United Kingdom
My questions are, why not just pay the money and then ask your credit card company to do a chargeback or reverse the transaction? Wouldn't it be easy for the guys doing this to be traced when they try to spend or withdraw the money?

Originally they would ask for it via some hard to follow method like Western Union, the more recent stuff uses bitcoins. Easy to trace methods are avoided for the reasons you mention.

Most if not all of the time people pay but no unlock happens.
Got any kind of data? Kidnapping and ransoms there do work better when as a trend the people do come home. I have not read any kind of analysis of people paying the scammers though.
 

Sicklyboy

#JOYCONBOYZFOREVER
Global Moderator
Joined
Jul 15, 2009
Messages
6,313
Trophies
2
Location
[̲̅$̲̅(̲̅ ͡° ͜ʖ ͡°̲̅)̲̅$̲̅]
XP
8,102
Country
United States
This is why I love my Time Capsule. Restore the file in seconds, then kindly tell the ransomers to fuck off.
I'm not very versed in Mac terminologies, so educate the un-wise in the difference between "Time Machine" and "Time Capsule"? Is Time Machine kind of like Windows' 'Shadow Copies' and "Time Capsule" an external backup? Because the article says that unfortunately it also encrypts Time Machine backups.
 

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
I'm not very versed in Mac terminologies, so educate the un-wise in the difference between "Time Machine" and "Time Capsule"? Is Time Machine kind of like Windows' 'Shadow Copies' and "Time Capsule" an external backup? Because the article says that unfortunately it also encrypts Time Machine backups.
I don't know anything about the Windows terminology so I can't compare. But I'll define them. 'Time Capsule' is the hardware. It's essentially a plug-and-play NAS which can also operate as a wireless router. 'Time Machine' is the software component which runs on the Mac. It performs hourly incremental backups, manages the maintenance of the backup history, and provides the user interface for accessing the backed up files.

I'm assuming that the trojan encrypts Time Machine backups in the same way as other volumes. The /Volumes directory in the Mac filesystem is like /mnt in Linux - it contains the mount points for all external storage devices (and, in fact, the boot device as well). It would be pretty stupid to have your Time Capsule mounted permanently (thus with a mount point folder constantly in /Volumes). The Time Machine software automatically finds the Time Capsule on the network, mounts it, performs the backup and then unmounts it. Presumably the trojan could carry out the encryption while the backup is in progress, however. I've actually got a spare Time Capsule I've been meaning to set up, so I might connect it up and do a full backup onto it to keep offline and just update it periodically.
 
  • Like
Reactions: Sicklyboy

Pedeadstrian

GBAtemp's Official frill-necked lizard.
Member
Joined
Oct 12, 2012
Messages
3,966
Trophies
2
Location
Sandy Eggo
XP
3,891
Country
United States
Good thing i use linux I only use windows for my games. Keep your shit on HDD and only plug it in when you absolutly need it that way you can just reinstall your OS.
Or just, you know, don't download shady crap or have annoying friends like @DarkFlare69 does.
 

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,321
Country
United Kingdom
RAID is not backup and data that does not exist offline in more than one location does not exist. That is how you really need to play such things if you care.
 

tHciNc

Total Random
Member
Joined
Jan 14, 2006
Messages
861
Trophies
1
XP
1,695
Country
New Zealand
This is why I love my Time Capsule. Restore the file in seconds, then kindly tell the ransomers to fuck off.
Additionally, KeRanger appears to still be under active development and it seems the malware is also attempting to encrypt Time Machine backup files to prevent victims from recovering their back-up data.
Be interesting to see if it actually works if and when infected computers get encrypted
 
Last edited by tHciNc,

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
Additionally, KeRanger appears to still be under active development and it seems the malware is also attempting to encrypt Time Machine backup files to prevent victims from recovering their back-up data.
Be interesting to see if it actually works if and when infected computers get encrypted
Yeah, @Sicklyboy mentioned that. See my reply above :)
 

GeneralSmiley

Well-Known Member
Newcomer
Joined
Oct 10, 2013
Messages
57
Trophies
1
Age
39
XP
435
Country
Interesting, I actually did update to that version (fortunately through the app instead of the site) then rolled back as my site did not recognise it as an accepted client yet. I wonder how it is able to circumnavigate OS X permissions, altering the user folder should require root but Transmission should only be running in userland.
 

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
something that's interesting is that if you got 2.90 from the site, it had the ransomware, but using the updater with the program was clean. I wonder how that happened...
The built-in updater must use a different server, perhaps pulling a diff from GitHub or MacUpdate to reduce the size of the download.

--------------------- MERGED ---------------------------

I wonder how it is able to circumnavigate OS X permissions, altering the user folder should require root but Transmission should only be running in userland.
Well, the user normally has administrator privileges and access to sudo. So the installer could run a shell script which runs 'sudo su', feeds in the password entered by the user ostensibly to install the client, and then runs the command to install the trojan as root. The trojan runs as a kext so runs as root anyway.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    SylverReZ @ SylverReZ: Or Genesis.