Mac ransomware

  • Thread starter Deleted User
  • Start date
  • Views 3,003
  • Replies 33
D

Deleted User

Guest
OP
On Facebook there's been a trending article today about the first known ransomware for Mac computers. Some of the files on the computer get encrypted and you have to pay the hackers 280 pounds to access them again.

My questions are, why not just pay the money and then ask your credit card company to do a chargeback or reverse the transaction? Wouldn't it be easy for the guys doing this to be traced when they try to spend or withdraw the money?

And if you're wondering, yes, I am a tech retard.
 

Touko White

(not)Banned
Member
Joined
Jan 12, 2016
Messages
687
Trophies
0
XP
750
Country
United Kingdom
How can you get infected by this? Is it through downloading crap software, or are there other ways to catch it, as well?
I don't need to lose my passwords.
 

Xenon Hacks

Well-Known Member
Member
Joined
Nov 13, 2014
Messages
7,414
Trophies
1
Age
30
XP
4,687
Country
United States
On Facebook there's been a trending article today about the first known ransomware for Mac computers. Some of the files on the computer get encrypted and you have to pay the hackers 280 pounds to access them again.

My questions are, why not just pay the money and then ask your credit card company to do a chargeback or reverse the transaction? Wouldn't it be easy for the guys doing this to be traced when they try to spend or withdraw the money?

And if you're wondering, yes, I am a tech retard.
Most if not all of the time people pay but no unlock happens.
 
  • Like
Reactions: Bubsy Bobcat

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,348
Country
United Kingdom
My questions are, why not just pay the money and then ask your credit card company to do a chargeback or reverse the transaction? Wouldn't it be easy for the guys doing this to be traced when they try to spend or withdraw the money?

Originally they would ask for it via some hard to follow method like Western Union, the more recent stuff uses bitcoins. Easy to trace methods are avoided for the reasons you mention.

Most if not all of the time people pay but no unlock happens.
Got any kind of data? Kidnapping and ransoms there do work better when as a trend the people do come home. I have not read any kind of analysis of people paying the scammers though.
 

Sicklyboy

#JOYCONBOYZFOREVER
Global Moderator
Joined
Jul 15, 2009
Messages
6,313
Trophies
2
Location
[̲̅$̲̅(̲̅ ͡° ͜ʖ ͡°̲̅)̲̅$̲̅]
XP
8,137
Country
United States
This is why I love my Time Capsule. Restore the file in seconds, then kindly tell the ransomers to fuck off.
I'm not very versed in Mac terminologies, so educate the un-wise in the difference between "Time Machine" and "Time Capsule"? Is Time Machine kind of like Windows' 'Shadow Copies' and "Time Capsule" an external backup? Because the article says that unfortunately it also encrypts Time Machine backups.
 

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
I'm not very versed in Mac terminologies, so educate the un-wise in the difference between "Time Machine" and "Time Capsule"? Is Time Machine kind of like Windows' 'Shadow Copies' and "Time Capsule" an external backup? Because the article says that unfortunately it also encrypts Time Machine backups.
I don't know anything about the Windows terminology so I can't compare. But I'll define them. 'Time Capsule' is the hardware. It's essentially a plug-and-play NAS which can also operate as a wireless router. 'Time Machine' is the software component which runs on the Mac. It performs hourly incremental backups, manages the maintenance of the backup history, and provides the user interface for accessing the backed up files.

I'm assuming that the trojan encrypts Time Machine backups in the same way as other volumes. The /Volumes directory in the Mac filesystem is like /mnt in Linux - it contains the mount points for all external storage devices (and, in fact, the boot device as well). It would be pretty stupid to have your Time Capsule mounted permanently (thus with a mount point folder constantly in /Volumes). The Time Machine software automatically finds the Time Capsule on the network, mounts it, performs the backup and then unmounts it. Presumably the trojan could carry out the encryption while the backup is in progress, however. I've actually got a spare Time Capsule I've been meaning to set up, so I might connect it up and do a full backup onto it to keep offline and just update it periodically.
 
  • Like
Reactions: Sicklyboy

Pedeadstrian

GBAtemp's Official frill-necked lizard.
Member
Joined
Oct 12, 2012
Messages
3,966
Trophies
2
Location
Sandy Eggo
XP
3,897
Country
United States
Good thing i use linux I only use windows for my games. Keep your shit on HDD and only plug it in when you absolutly need it that way you can just reinstall your OS.
Or just, you know, don't download shady crap or have annoying friends like @DarkFlare69 does.
 

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,348
Country
United Kingdom
RAID is not backup and data that does not exist offline in more than one location does not exist. That is how you really need to play such things if you care.
 

tHciNc

Total Random
Member
Joined
Jan 14, 2006
Messages
861
Trophies
1
XP
1,702
Country
New Zealand
This is why I love my Time Capsule. Restore the file in seconds, then kindly tell the ransomers to fuck off.
Additionally, KeRanger appears to still be under active development and it seems the malware is also attempting to encrypt Time Machine backup files to prevent victims from recovering their back-up data.
Be interesting to see if it actually works if and when infected computers get encrypted
 
Last edited by tHciNc,

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
Additionally, KeRanger appears to still be under active development and it seems the malware is also attempting to encrypt Time Machine backup files to prevent victims from recovering their back-up data.
Be interesting to see if it actually works if and when infected computers get encrypted
Yeah, @Sicklyboy mentioned that. See my reply above :)
 

GeneralSmiley

Well-Known Member
Newcomer
Joined
Oct 10, 2013
Messages
57
Trophies
1
Age
39
XP
439
Country
Interesting, I actually did update to that version (fortunately through the app instead of the site) then rolled back as my site did not recognise it as an accepted client yet. I wonder how it is able to circumnavigate OS X permissions, altering the user folder should require root but Transmission should only be running in userland.
 

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
something that's interesting is that if you got 2.90 from the site, it had the ransomware, but using the updater with the program was clean. I wonder how that happened...
The built-in updater must use a different server, perhaps pulling a diff from GitHub or MacUpdate to reduce the size of the download.

--------------------- MERGED ---------------------------

I wonder how it is able to circumnavigate OS X permissions, altering the user folder should require root but Transmission should only be running in userland.
Well, the user normally has administrator privileges and access to sudo. So the installer could run a shell script which runs 'sudo su', feeds in the password entered by the user ostensibly to install the client, and then runs the command to install the trojan as root. The trojan runs as a kext so runs as root anyway.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • Psionic Roshambo @ Psionic Roshambo:
    They did end up using some of my stuff in the first Gulf war though lol
  • BakerMan @ BakerMan:
    GUYS I JUST COMMENTED A YOUR MOM JOKE ON A GACHA YT COMMUNITY POST (the algorithm has cursed me in terms of community posts, bc I fuck around on that sort of community post, just commenting and being a jackass)
    +1
  • BakerMan @ BakerMan:
    IT FELT SO GOOD
    +1
  • BakerMan @ BakerMan:
    the OP made a couple vocaloid characters, and the post had the caption "Guess who I did 💙💛❤️

    hint: they're from vocaloid"
    +1
  • BakerMan @ BakerMan:
    to which I responded:
    "Guess who I did 💙💛❤️

    hint: it's uremum"
    +1
  • Psionic Roshambo @ Psionic Roshambo:
    I studied IPV6 if they hadn't passed the cyber terrorism laws omg.... In theory I have some awesome pranks but I'm afraid to test them lol
  • BigOnYa @ BigOnYa:
    Thank goodness for VPN nowadays
  • Psionic Roshambo @ Psionic Roshambo:
    I don't trust them lol
  • Psionic Roshambo @ Psionic Roshambo:
    Hmmm probably because reasons...
  • Psionic Roshambo @ Psionic Roshambo:
    Ohhh don't touch them lol
  • BigOnYa @ BigOnYa:
    I don't trust the free ones, but ipvanish I've used for couple years now, n like
  • Psionic Roshambo @ Psionic Roshambo:
    I wonder if they could get CPUs to run that hot then use the heat to power a steam turbine to power the CPUs....
  • BigOnYa @ BigOnYa:
    Good idea, or at least power the GPU
  • Psionic Roshambo @ Psionic Roshambo:
    It's not the movies or games downloads that I would worry about, like breaking into networks, downloading encrypted things, spying on network traffic. I have seen so many "Top Secret" seals on files when I was a kid
  • Psionic Roshambo @ Psionic Roshambo:
    I was obsessed with finding UFOs, a surprising amount of US files where stashed on computers in other countries, China back in the early 90s omg sooo much
  • BigOnYa @ BigOnYa:
    Yea that crazy, I've never tried hack into anything, I just pirate, and my ISP have send me 3-4 letters, so had to VPN it
  • Psionic Roshambo @ Psionic Roshambo:
    Ship to ship communication software for the Navy although without access to the encrypting chips it was mostly useless
  • Psionic Roshambo @ Psionic Roshambo:
    I bet now a 4090 could probably crack it? Hmmm maybe not even back then I'm pretty sure they where using like 1024 bit encryption
  • Psionic Roshambo @ Psionic Roshambo:
    Yayyy the one set finished 324GBs lol
  • Psionic Roshambo @ Psionic Roshambo:
    Compressed....
  • Psionic Roshambo @ Psionic Roshambo:
    I wonder how many years that would have taken on a 56K modem lol
  • Psionic Roshambo @ Psionic Roshambo:
    18000 hours lol
  • Psionic Roshambo @ Psionic Roshambo:
    750 days lol
    Psionic Roshambo @ Psionic Roshambo: 750 days lol