Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

New macOS ransomware spotted in the wild
Macworld ^ | February 22, 2017 | By Lucian Constantin

Posted on 02/22/2017 5:15:34 PM PST by Swordmaker

The program’s creator asks for payments but doesn’t have the encryption key to unlock victims’ files

A new file-encrypting ransomware program for macOS is being distributed through BitTorrent websites, and users who fall victim to it won’t be able to recover their files, even if they pay.

Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it’s a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.

OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac and is being distributed as a BitTorrent download. It is written in Apple’s Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.

The application installer is not signed with a developer certificate issued by Apple, which makes the malware’s installation harder on recent OS X and macOS versions, as users would need to override the default security settings.

The biggest problem with this malware, though, is the way in which it encrypts files. It generates a single encryption key for all files and then stores the files in encrypted zip archives. However, the malware doesn’t appear to have any ability to communicate with an external server, so the encryption key is never sent to the attacker before being destroyed.

This means that even if victims follow the hacker’s instructions (included in a README!.txt file left on the computer) on how to pay the ransom, they won’t get their files back. The encryption appears to be strong, so it cannot be cracked using alternative means either.

“The random ZIP password is generated with arc4random_uniform which is considered a secure random number generator,” the ESET researchers said in a blog post Wednesday. “The key is also too long to brute force in a reasonable amount of time.”

The researchers have monitored the bitcoin wallet address used by the attacker and they haven’t seen any payment made so far. The publicly accessible mailbox the attacker used also doesn’t show signs of communication with potential victims.

Even though OSX/Filecoder.E is likely the work of an inexperienced coder who chose to scam victims rather than build a command-and-control infrastructure to handle key storage and decryption, it does show that macOS is a viable target for ransomware creators. The variety of such malicious programs for this OS is likely to increase as the growing number of ransomware gangs compete for a limited pool of paying victims on other platforms. 


TOPICS: Business/Economy; Computers/Internet; Conspiracy
KEYWORDS: apple; applepinglist; mac; macbook; macos; malware; ransomware; security
This takes industrial strength stupid to be damaged by this malware. First you have to be crooked to download a bit torrent to steal software. . . then you have to turn off the built in protections against installing an unsigned. un-certificated application from an unknown source. . . and then you have to have NO BACKUP.

Don't download software from untrusted sources. DUH!

1 posted on 02/22/2017 5:15:34 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
A very poorly written (In Swift) Ransom malware for Macs has been spotted in the wild. . . but you have to be industrial strength stupid to get caught by it. 1st, you have to be a crooked pirate willing to download a tool to steal software to even be interested in the app that masquerades as a tool to break into commercial software from a bit torrent site. Then you have to be stupid enough to turn off the built-in protections in OS X or macOS that prevents installing non-certificated, unauthorized applications. . . and then you have to have NOT MADE ANY BACK-UPS of your data. If you do all of this, you probably deserve to lose your data to this poorly written malware. — PING!


Apple Mac Ransom Ware
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 02/22/2017 5:21:18 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

If John Podesta’s data isn’t safe... no one’s data is safe.


3 posted on 02/22/2017 5:22:28 PM PST by rwilson99 (How exactly would John 3:16 not apply to Mary?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rwilson99
If John Podesta’s data isn’t safe... no one’s data is safe.

Not everyone can feel safe enough to use "Password" as a password like John.

4 posted on 02/22/2017 5:45:04 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

Yup.

“OSX/Filecoder.E masquerades as a cracking tool ... . ... users would need to override the default security settings.”

Yup. Industrial-strength stupid user required. Starting out with serious malice to obtain what claims, with no validation, to be a _free_ (why?) tool for bypassing the “pay first” code on affordable software (not cheap, but affordable), then be _surprised_ when it bites _you_ in the a$$. Next that biting requires deliberately disabling protections put in place to _prevent_ such nastiness.

Pause here for a moment for a tangent. As a father of 2, what the he11 is it about a certain age group that believes that “don’t do that” is NOT stated for the recipient’s best interests? Does the [ab]user in question think Apple went through all that trouble to enact security _just_ to annoy the user? Resuming...

Where are we...ah. Would-be criminal obtains unverified criminal tools and is surprised he’s the victim of a criminal - as if user & malware author had agreed to work in their mutual best interest. (Ab)user takes deliberate steps to bypass security to bring this un-vetted source-unknown crap onto his own machine. And then, as noted, ... no backup? Really?

And here’s the biggest kicker of all: some fing troll is going to come on this thread and _blame_Apple_ for this “maybe your purpose in life is to serve as a warning to others” incident.


5 posted on 02/22/2017 5:58:12 PM PST by ctdonath2 (Understand the Left: "The issue is never the issue. The issue is always the Revolution.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Have never been hit with ransomeware or known anyone who has been struck, to the best of my knowledge. But I understand it is becoming a real problem.

Anyone convicted beyond all doubt of creating/ employing ransomware should be given automatic death penalty.

6 posted on 02/22/2017 5:59:19 PM PST by Ciaphas Cain (The choice to be stupid is not a conviction I am obligated to respect.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

The biggest problem with this malware, though, is the way in which it encrypts files. It generates a single encryption key for all files and then stores the files in encrypted zip archives. However, the malware doesn’t appear to have any ability to communicate with an external server, so the encryption key is never sent to the attacker before being destroyed.


Malware has bugs


7 posted on 02/22/2017 6:58:03 PM PST by Flick Lives
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Not everyone can feel safe enough to use "Password" as a password like John.

I read that Podesta would have been Hillary Clinton's choice for Secretary of State if she'd won. Which makes perfect sense when you think about it.

8 posted on 02/23/2017 5:49:21 AM PST by jalisco555 ("In a Time of Universal Deceit Telling the Truth Is a Revolutionary Act" - George Orwell)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Ciaphas Cain

“Anyone convicted beyond all doubt of creating/ employing ransomware should be given automatic death penalty.”

Exactly why the Constitution contains the “Letters of Marque” clause: Congress can authorize private citizens to wage war for economic defense.


9 posted on 02/23/2017 6:07:22 AM PST by ctdonath2 (Understand the Left: "The issue is never the issue. The issue is always the Revolution.")
[ Post Reply | Private Reply | To 6 | View Replies]

To: jalisco555
I read that Podesta would have been Hillary Clinton's choice for Secretary of State if she'd won. Which makes perfect sense when you think about it.

yeah, it does, doesn't it. I wonder if he would have taken over her hardware for his own private server?

10 posted on 02/23/2017 1:40:44 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Ciaphas Cain

A Sheriff Department here in Arkansas paid the ransom for such an attack (Windows-based) a couple months ago.

When law enforcement (who had consulted with the FBI) give in and pay the ransom... good grief


11 posted on 02/23/2017 9:53:21 PM PST by TheBattman (Guncontrol works - just ask Chicago...)
[ Post Reply | Private Reply | To 6 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson