{"id":20992,"date":"2023-01-13T04:30:06","date_gmt":"2023-01-13T12:30:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/01\/13\/news-14725\/"},"modified":"2023-01-13T04:30:06","modified_gmt":"2023-01-13T12:30:06","slug":"news-14725","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/01\/13\/news-14725\/","title":{"rendered":"Microsoft doc details the dos and don\u2019ts of Mac ransomware &lt;u&gt;"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2022\/09\/ransomware-attack-100932412-small.jpg\"\/><\/p>\n<p>As <a href=\"https:\/\/www.computerworld.com\/article\/3679730\/jamf-q3-data-confirms-rapid-mac-adoption-across-the-enterprise.html\">enterprise adoption of the Apple platform accelerates<\/a>, it\u2019s important to note that Macs can and sometimes do get hit by ransomware. So it\u2019s good to stay tuned to security concerns on a platform and application level \u2014 and take precautions.<\/p>\n<p>With this in mind, extensive insights into Mac ransomware recently published only to be subsequently removed by Microsoft, can help explain these threats. The impact of such attack can be huge \u2013 ransomware already costs victims <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031\/\" rel=\"noopener nofollow\" target=\"_blank\">hundreds of billions each year<\/a>, and no one is immune.\u00a0<\/p>\n<p>UK newspaper <em>The Guardian<\/em> was hit by a <a href=\"https:\/\/pressgazette.co.uk\/publishers\/guardian-ransomware-attack\/\" rel=\"noopener nofollow\" target=\"_blank\">ransomware attack in December<\/a> and continues to suffer. In the US, <a href=\"https:\/\/www.emsisoft.com\/en\/blog\/43258\/the-state-of-ransomware-in-the-us-report-and-statistics-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">Emsisoft<\/a> says 1,981 schools, 290 hospitals, 105 local governments and 44 universities and colleges were hit by ransomware in 2022 alone.<\/p>\n<p>Microsoft\u2019s in-depth report was evidently intended to support adoption of its own security offering, <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/microsoft-defender-endpoint-mac?view=o365-worldwide\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft Defender<\/a>, but it provides valuable advice to any company that wants to harden its Mac security.<\/p>\n<p>However, security researchers such as Patrick Wardle noted that Microsoft&#8217;s piece seemed close to statements made in his own excellent book, &#8216;The Art of Mac Malware&#8217;, <a href=\"https:\/\/taomm.org\/vol1\/read.html\" rel=\"nofollow\">which you can access free here<\/a>. He also wrote this <a href=\"https:\/\/objective-see.org\/blog\/blog_0x0F.html\" rel=\"nofollow\">excellent post<\/a> detailing some of the history of this scourge.<\/p>\n<p>The original report does a good job of explaining some of the ways the most prevalent forms of ransomware try to hide themselves from detection by automated analysis systems and manual inspection. It\u2019s useful to understand some of the methods that allow such attacks take place undetected (until it\u2019s too late).<\/p>\n<p>It also helps guide security first response if an attack does take place; in the case of some sophisticated attacks, it\u2019s not enough to identify just one invasion vector, as once inside the systems, some will implant second- and even third-line bugs in case of detection.<\/p>\n<p>That\u2019s why emergency response teams at times do detailed system and traffic audits before switching systems off. They know that once an exploit is switched off, attackers will cease the invasion, making it harder to detect the miscreant.<\/p>\n<p>In many ways, the best advice can be seen as relatively basic.\u00a0As ever, the most critical slice of sagacity is an admonishment to \u201cinstall apps from trusted sources only, such as a software platform\u2019s official app store.\u201d<\/p>\n<p>It\u2019s vital to recognize that human error remains the most pervasive way in which attacks occur, and all teams should understand the need to remain watchful when installing software, even on the personal partitions of their device. You shouldn\u2019t click on a link you don\u2019t know the source of. You <a href=\"https:\/\/www.computerworld.com\/article\/3680548\/why-macs-and-iphones-should-avoid-installing-orphan-apps.html\">shouldn\u2019t install an app you can\u2019t trust<\/a>.<\/p>\n<p>It&#8217;s simple stuff, but has a huge impact.<\/p>\n<p>Another recommendation: use browsers that block malicious sites, phishing sites, and other sources of nasty malware. Microsoft recommends Edge, but in truth the key ingredient is to enable full security protection on your browsers and act if you receive a warning when browsing online.<\/p>\n<p>Security teams also recommend enterprises use the many OS X management solutions that exist to secure even remote systems against attack. You can use an MDM console to restrict access to privileged Mac system resources such as <em>LaunchDaemons<\/em> or <em>LaunchAgents<\/em> folders, for example. Doing so helps mitigate against more common vulnerabilities.<\/p>\n<p>Another good reason to use enterprise management systems is that these can be employed to remotely install security and operating system updates as they emerge.<\/p>\n<p>Installing software updates is a critical step to Mac or any other platform security.<\/p>\n<p>Apple has published several critical security updates in recent months and the pace at which it is doing so betrays the significantly increased activity among threat actors at this time. This is also why Apple has put <a href=\"https:\/\/www.macrumors.com\/2022\/12\/15\/apple-releases-macos-ventura-13-2-security-update\/\" rel=\"noopener nofollow\" target=\"_blank\">Rapid Security Response<\/a> in place for the Mac, enabling the company to push urgent security updates across the Mac platform in the event of a security crisis.<\/p>\n<p>Such reports should be of interest to anyone involved in active IT administration or security protection. Its report analyses how four Mac ransomware families (<a href=\"https:\/\/en.wikipedia.org\/wiki\/KeRanger\" rel=\"noopener nofollow\" target=\"_blank\">KeRanger<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Ransom:Win32\/Filecoder.DD!MTB&amp;ThreatID=2147763509\" rel=\"noopener nofollow\" target=\"_blank\">Filecoder<\/a>, <a href=\"https:\/\/digital.nhs.uk\/cyber-alerts\/2017\/cc-1470\" rel=\"noopener nofollow\" target=\"_blank\">MacRansom<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/ransom-osx-evilquest\" rel=\"noopener nofollow\" target=\"_blank\">EvilQuest<\/a>) abuse system functionalities to infect machines.<\/p>\n<p>The original report explained how they install themselves, mask their existence, proliferate, and ensure their own persistence in the event of a system restart. It\u2019s fascinating stuff, which\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/01\/05\/unraveling-the-techniques-of-mac-ransomware\/\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft has shared<\/a>\u00a0as a \u201ctechnical reference that researchers can use and build upon to understand Mac threats and improve protections.\u201d<\/p>\n<p>However, on removing the report Microsoft&#8217;s security team <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1612563091648286720?s=20&amp;t=f46hTq9MXhsLJAfQ4oo9ow\" rel=\"noopener nofollow\" target=\"_blank\">Tweeted to Wardle<\/a>: &#8220;We are grateful to the security research community who works tirelessly to protect our world. We heard the feedback that we didn&#8217;t acknowledge the extensive work done by others on this topic. We have removed this blog.&#8221;<\/p>\n<p>We can anticipate a <a href=\"https:\/\/www.computerworld.com\/article\/3683269\/what-to-expect-from-apple-in-2023.html\">great deal of activity<\/a> around security on Apple\u2019s Mac and mobile platforms this year. Apple has <a href=\"https:\/\/www.computerworld.com\/article\/3682889\/apple-sets-a-security-challenge-for-2023.html\">told us it is taking this extremely seriously<\/a>, in part because we live in dangerously hostile times \u2014 the <a href=\"https:\/\/kolektiva.social\/@chadloder\/109406380942373215\" rel=\"noopener nofollow\" target=\"_blank\">recent Twitter hack<\/a> tells us multiple parties are seeking out weaknesses at this time. Apple partners, <a href=\"https:\/\/www.computerworld.com\/article\/3683510\/jamf-protect-adds-powerful-telemetry-to-protect-mac-enterprise.html\">including Jamf<\/a>, are also providing valuable Mac protection, and Apple itself <a href=\"https:\/\/www.applemust.com\/apple-launches-security-portal-blog-and-more\/\" rel=\"noopener nofollow\" target=\"_blank\">recently launched a new security portal<\/a> offering in-depth security insights.<\/p>\n<p>Meanwhile, you and your staff should be careful about where you download apps, avoid clicking on links you don\u2019t recognize, and ensure full browser security features are enabled. You should also use strong passwords for Macs and all your services and use built-in features such as &#8220;Protect Mail Activity&#8221; and iCloud Private Relay to help harden overall security and identity protection. And if you think you might be under attack, or likely to be, do use <a href=\"https:\/\/www.applemust.com\/how-to-use-lockdown-mode-on-your-iphone-ipad-and-mac\/\" rel=\"noopener nofollow\" target=\"_blank\">Lockdown Mode<\/a>.<\/p>\n<p><strong>Report updated January 13<\/strong> with news of Microsoft&#8217;s removal of the original post, some insight into why and addition of new resources to help enterprises understand and battle ransomware.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<\/em><a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\"><em style=\"font-weight: inherit;\">Apple Discussions<\/em><\/a><em>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3684849\/microsoft-doc-details-the-dos-and-donts-of-mac-ransomware-u.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2022\/09\/ransomware-attack-100932412-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>As <a href=\"https:\/\/www.computerworld.com\/article\/3679730\/jamf-q3-data-confirms-rapid-mac-adoption-across-the-enterprise.html\">enterprise adoption of the Apple platform accelerates<\/a>, it\u2019s important to note that Macs can and sometimes do get hit by ransomware. So it\u2019s good to stay tuned to security concerns on a platform and application level \u2014 and take precautions.<\/p>\n<h2><strong>Knowledge is power<\/strong><\/h2>\n<p>With this in mind, extensive insights into Mac ransomware recently published only to be subsequently removed by Microsoft, can help explain these threats. The impact of such attack can be huge \u2013 ransomware already costs victims <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031\/\" rel=\"noopener nofollow\" target=\"_blank\">hundreds of billions each year<\/a>, and no one is immune.\u00a0<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3684849\/microsoft-doc-details-the-dos-and-donts-of-mac-ransomware-u.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,10480,10403,714],"class_list":["post-20992","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-ios","tag-macos","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20992"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20992\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20992"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}