First Fully Functional Mac Ransomware Contained Before It Could Cause Havoc

  /     /     /  
Publicated : 22/11/2024   Category : security


First Fully Functional Mac Ransomware Contained Before It Could Cause Havoc


KeRanger slips by Apples protections by piggybacking on legitimate BitTorrent client.



The first fully functional ransomware for Mac OS X has been discovered in the wild, but was contained before it did damage.
Although Kaspersky discovered a Mac ransomware sample in 2014, called FileCoder, it was incomplete. The new ransomware, KeRanger,
found by Palo Alto Networks Unit 42
, is completely capable. KeRanger bypasses Apples Gatekeeper -- the tool that prevents unsigned code from running on Mac operating systems -- by piggy-backing on an infected version of Transmission, an open-source BitTorrent client, which is signed with a valid Mac application developers certificate.  
How precisely the ransomware was signed and delivered is unclear. Most likely the certificate was stolen, says Ryan Olson, director of threat intelligence for Unit 42. The cert is owned by a Turkish company, but at this time, Palo Alto does not have much information about how the company was compromised, says Olson. 
It is possible that Transmissions official website was compromised, and that the legitimate Transmission installers were replaced by the recompiled malicious versions, researchers wrote.
When the victim machine downloads and installs the application, KeRanger waits for three days, doing nothing, before it initiates contact with its command-and-control server (via the Tor network).
Most ransomware doesnt wait, says Olson. Keranger might behave differently because it piggybacks on a legitimate tool. As Olson explains, if a user downloaded Transmission and was immediately hit with a ransomware attack, it would be pretty easy to connect one with the other. The three-day wait would theoretically make it harder to identify the source of the infection...only it didnt work out that way. The Palo Alto team discovered KeRanger quickly, before it was able to do much damage. They probably didnt expect anyone to find it so fast, says Olson.
If C2 communication is initiated, the server responds with an RSA public key and a text file with straightforward instructions for paying a ransom of 1 Bitcoin to retrieve files. (The instructions also include offers of decrypt one file for free and if you have any questions -- you are welcome.)
KeRanger is attempting to not just encrypt standard files, but also Time Machine backups. It also may be trying to develop backdoor functionality. 
Although Olson says that KeRangers ability to slip by Gatekeeper does indicate another hole in the walled garden of Apples secure development environment, this is largely a positive story.
The reason to not be scared is that the impact was low, says Olson. Apple, he says, responded quickly to the announcement, revoking the abused certificate and updating XProtect signatures.
However, it’s important to note, says Thomas Reed, director of Mac offerings at Malwarebytes, that if you have already run the infected copy of Transmission on your Mac, this will not prevent you from opening it again… your Mac will consider it safe at this point, since it has been successfully opened previously. That means this doesn’t help users who are already infected and who have a 3-day timer counting down.
If you have downloaded the Transmission app recently, you should delete the app and restart your computer, says Reed. This should prevent re-activation of the malware. 
This represents an interesting twist in the tale of Mac malware, says James Maude, senior security engineer at Avecto, as previously many strains first appeared hidden in pirated software on torrent sites. In this case the attackers seems to have targeted the torrent client itself rather than the downloads. 
This incident appears particularly sophisticated, since it involves a compromise of a software developers distribution site and an unrelated and likely stolen signing key, says Tod Beardsley, security research manager at Rapid7. The fact that the compromise was discovered and mitigated in under a day means that the end users of Transmission are at fairly low risk.
Transmission is a solid and mature open-source project, says Beardsley, and Im sure the maintainers are investigating how the website compromise happened in the first place in order to avoid getting Trojaned in the future.
Related stories:
The State of Apple Security
10 Shocking New Facts About Ransomware
 
Find out more about
security threats
at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas.
Register today
and receive an early bird discount of $200.

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
First Fully Functional Mac Ransomware Contained Before It Could Cause Havoc