Reuters and 9to5Mac report that the “KeRanger” or “KeyRanger” ransomware began showing up on Apple computers on Friday. Users are acquiring the malware through a tainted version (v. 2.90) of a file-sharing program called Transmission.
After a few days of lying dormant, the ransomware encrypts the infected computer's files and demands a payment of one Bitcoin, which is currently valued at around $409.
Because of the dormant period in the ransomware, computers that were infected over the weekend may not yet be locked down.
Apple responded to the news of the attack by revoking the the digital certificate that enabled the software to install itself on Macs, while Transmission removed the infected software from its website. A subsequent release (v. 2.92) of Transmission claims to automatically remove the ransomware.
https://consumerist.com/2016/03/07/apple-users-targeted-with-widescale-ransomware-campaign-for-first-time/
Reuters and 9to5Mac report that the “KeRanger” or “KeyRanger” ransomware began showing up on Apple computers on Friday. Users are acquiring the malware through a tainted version (v. 2.90) of a file-sharing program called Transmission.
After a few days of lying dormant, the ransomware encrypts the infected computer's files and demands a payment of one Bitcoin, which is currently valued at around $409.
Because of the dormant period in the ransomware, computers that were infected over the weekend may not yet be locked down.
Apple responded to the news of the attack by revoking the the digital certificate that enabled the software to install itself on Macs, while Transmission removed the infected software from its website. A subsequent release (v. 2.92) of Transmission claims to automatically remove the ransomware.
#crime