Posted on 02/22/2017 5:15:34 PM PST by Swordmaker
The programs creator asks for payments but doesnt have the encryption key to unlock victims files
A new file-encrypting ransomware program for macOS is being distributed through BitTorrent websites, and users who fall victim to it wont be able to recover their files, even if they pay.
Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and its a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.
OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac and is being distributed as a BitTorrent download. It is written in Apples Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.
The application installer is not signed with a developer certificate issued by Apple, which makes the malwares installation harder on recent OS X and macOS versions, as users would need to override the default security settings.
The biggest problem with this malware, though, is the way in which it encrypts files. It generates a single encryption key for all files and then stores the files in encrypted zip archives. However, the malware doesnt appear to have any ability to communicate with an external server, so the encryption key is never sent to the attacker before being destroyed.
This means that even if victims follow the hackers instructions (included in a README!.txt file left on the computer) on how to pay the ransom, they wont get their files back. The encryption appears to be strong, so it cannot be cracked using alternative means either.
The random ZIP password is generated with arc4random_uniform which is considered a secure random number generator, the ESET researchers said in a blog post Wednesday. The key is also too long to brute force in a reasonable amount of time.
The researchers have monitored the bitcoin wallet address used by the attacker and they havent seen any payment made so far. The publicly accessible mailbox the attacker used also doesnt show signs of communication with potential victims.
Even though OSX/Filecoder.E is likely the work of an inexperienced coder who chose to scam victims rather than build a command-and-control infrastructure to handle key storage and decryption, it does show that macOS is a viable target for ransomware creators. The variety of such malicious programs for this OS is likely to increase as the growing number of ransomware gangs compete for a limited pool of paying victims on other platforms.
Don't download software from untrusted sources. DUH!
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
If John Podesta’s data isn’t safe... no one’s data is safe.
Not everyone can feel safe enough to use "Password" as a password like John.
Yup.
“OSX/Filecoder.E masquerades as a cracking tool ... . ... users would need to override the default security settings.”
Yup. Industrial-strength stupid user required. Starting out with serious malice to obtain what claims, with no validation, to be a _free_ (why?) tool for bypassing the “pay first” code on affordable software (not cheap, but affordable), then be _surprised_ when it bites _you_ in the a$$. Next that biting requires deliberately disabling protections put in place to _prevent_ such nastiness.
Pause here for a moment for a tangent. As a father of 2, what the he11 is it about a certain age group that believes that “don’t do that” is NOT stated for the recipient’s best interests? Does the [ab]user in question think Apple went through all that trouble to enact security _just_ to annoy the user? Resuming...
Where are we...ah. Would-be criminal obtains unverified criminal tools and is surprised he’s the victim of a criminal - as if user & malware author had agreed to work in their mutual best interest. (Ab)user takes deliberate steps to bypass security to bring this un-vetted source-unknown crap onto his own machine. And then, as noted, ... no backup? Really?
And here’s the biggest kicker of all: some fing troll is going to come on this thread and _blame_Apple_ for this “maybe your purpose in life is to serve as a warning to others” incident.
Anyone convicted beyond all doubt of creating/ employing ransomware should be given automatic death penalty.
The biggest problem with this malware, though, is the way in which it encrypts files. It generates a single encryption key for all files and then stores the files in encrypted zip archives. However, the malware doesnt appear to have any ability to communicate with an external server, so the encryption key is never sent to the attacker before being destroyed.
Malware has bugs
I read that Podesta would have been Hillary Clinton's choice for Secretary of State if she'd won. Which makes perfect sense when you think about it.
“Anyone convicted beyond all doubt of creating/ employing ransomware should be given automatic death penalty.”
Exactly why the Constitution contains the “Letters of Marque” clause: Congress can authorize private citizens to wage war for economic defense.
yeah, it does, doesn't it. I wonder if he would have taken over her hardware for his own private server?
A Sheriff Department here in Arkansas paid the ransom for such an attack (Windows-based) a couple months ago.
When law enforcement (who had consulted with the FBI) give in and pay the ransom... good grief
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.