Category: Palo Alto Networks

New Apple OS X Ransomware discovered by “Unit 42” of Palo Alto Networks


A new Ransomware targeting Apple OS X based computers has been found and reported by Palo Alto Networks
. Their Unit 42 Security Group have named this new ransomware as “KeRanger”.

Two installers of the Transmission BitTorrent ailient installer for OS X were found by Palo Alto Networks to be infected with KeRanger Ransomware.

The following is a quote from the Palo Alto Networks Reseaarch Center blog:

Palo Alto Networks reported the ransomware issue to the Transmission Project and to Apple on March 4. Apple has since revoked the abused certificate and updated XProtect antivirus signature, and Transmission Project has removed the malicious installers from its website.

The Transmissionbt.com home page features the following security notice:

Read Immediately!!!!

Everyone running 2.90 on OS X should immediately upgrade to and run 2.92, as they may have downloaded a malware-infected file. This new version will make sure that the “OSX.KeRanger.A” ransomware (more information available here) is correctly removed from your computer.

Users of 2.91 should also immediately upgrade to and run 2.92. Even though 2.91 was never infected, it did not automatically remove the malware-infected file.

Click on this line to visit the Palo Alto Networks Unit 42 webpage. There you will compete details about KeRanger. Scroll down to the section titled: How To Protect Yourself.

Click on this line to visit the MacRumors website to read their post titled: “First Mac Ransomware Found in Transmission BitTorrent Client”.

Click on this line to visit the 9to5Mac website to read their post titled “First OS X ransomware detected in the wild, will maliciously encrypt hard drives on infected Macs (updated: how to fix)

Click on this ine to visit the arstechnica website to read their post titled: “First Mac-targeting ransomware hits Transmission users, researchers say Rogue copy of BitTorrent client results in KeRanger install, which demands 1 bitcoin.”

Click on this line to visit the Reuters website to read their post titled: “Apple users targeted in first known Mac ransomware campaign“.

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

 

Posted by: Vincent Banial
www.uniquelytoronto.com

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice. Any offers mentioned in this post are also subject to change without notice.

Advertisements

Apple withdraws China Apps for the Apple App Store, after XcodeGhost Malware infected IOS Apps were found by CyberSecurity firm Palo Alto Networks.

Ryan Olson, Intelligence Director, with Cyber Security Firm Palo Alto Networks discusses the finding of Apps on Apple’s App Store which were infected by XcodeGhost Malware.

Ryan Olson states that this is an important issue for every Apple IOS user.

If you had downloaded an infected app, one solution might be to then download an “updated” version as it becomes available on Apple’s App Store.

Video is courtesy of the Associated Press YouTube Channel

You can read full details about what Unit 42 of Palo Also Networks had found regarding the XcodeGhost Malware infected IOS Apps found on Apple’s App Store by clicking on this line.

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

 

Posted by: Vincent Banial
http://www.uniquelytoronto.com

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.

CryptoLocker ransomware variant hits Police departments in midcoast and northern Maine

CryptoLocker gained fame and fortune for the people behind it. It also spawned a growing number of variants, which can supposedly be found on the DarkNet via the Tor Onion network.

Continue reading