{"id":6745,"date":"2017-02-22T12:31:27","date_gmt":"2017-02-22T20:31:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/22\/news-536\/"},"modified":"2017-02-22T12:31:27","modified_gmt":"2017-02-22T20:31:27","slug":"news-536","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/22\/news-536\/","title":{"rendered":"New macOS ransomware spotted in the wild"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt4.staticworld.net\/images\/article\/2016\/12\/digital_key.jpg-100699424-large.3x2.jpeg\"\/><\/p>\n<p><strong>Credit to Author: Lucian Constantin| Date: Wed, 22 Feb 2017 11:09:00 -0800<\/strong><\/p>\n<p> A new file-encrypting ransomware program for macOS is being distributed through bit torrent websites, and users who fall victim to it won&#8217;t be able to recover their files &#8212; even if they pay. <\/p>\n<p> Crypto ransomware programs for macOS are rare. This is the <a href=\"http:\/\/www.computerworld.com\/article\/3042184\/security\/mac-ransomware-kerangers-flaws-could-let-users-recover-files.html\" target=\"_blank\">second such threat<\/a> found in the wild so far, and it&#8217;s a poorly designed one. The program was named OSX\/Filecoder.E by the malware researchers from antivirus vendor ESET who found it. <\/p>\n<p> OSX\/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac. It is written in Apple&#8217;s Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation. <\/p>\n<p> The application installer is not signed with a developer certificate issued by Apple, which makes the malware&#8217;s installation harder on newer OS X and macOS versions, as users would need to override the default security settings. <\/p>\n<p> The biggest problem with this malware, though, is the way in which it encrypts files. It generates a single encryption key for all files and then stores the files in encrypted ZIP archives. However, the malware doesn&#8217;t appear to have any ability to communicate with an external server, so the encryption key is never sent to the attacker before being destroyed. <\/p>\n<p> This means that even if victims follow the hacker&#8217;s instructions (included in a README!.txt file left on the computer) on how to pay the ransom, they won&#8217;t get their files back. The encryption appears to be strong, so it cannot be cracked using alternative means either. <\/p>\n<p> &#8220;The random ZIP password is generated with arc4random_uniform, which is considered a secure random number generator,&#8221; the ESET researchers said in <a href=\"http:\/\/www.welivesecurity.com\/2017\/02\/22\/new-crypto-ransomware-hits-macos\/\" target=\"_blank\">a blog post<\/a> Wednesday. &#8220;The key is also too long to brute force in a reasonable amount of time.&#8221; <\/p>\n<p> The researchers have monitored the bitcoin wallet address used by the attacker and they haven&#8217;t seen any payment made so far. The publicly accessible mailbox the attacker used also doesn&#8217;t show signs of communication with potential victims. <\/p>\n<p> Even though OSX\/Filecoder.E is likely the work of an inexperienced coder who chose to scam victims rather than build a command-and-control infrastructure to handle key storage and decryption, it does show that macOS is a viable target for ransomware creators. The variety of such malicious programs for this OS is likely to increase as the growing number of ransomware gangs compete for a limited pool of paying victims on other platforms.\u00a0 <\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3173165\/security\/new-macos-ransomware-spotted-in-the-wild.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt4.staticworld.net\/images\/article\/2016\/12\/digital_key.jpg-100699424-large.3x2.jpeg\"\/><\/p>\n<p><strong>Credit to Author: Lucian Constantin| Date: Wed, 22 Feb 2017 11:09:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p> A new file-encrypting ransomware program for macOS is being distributed through bit torrent websites, and users who fall victim to it won&#8217;t be able to recover their files &#8212; even if they pay.<\/p>\n<p> Crypto ransomware programs for macOS are rare. This is the <a href=\"http:\/\/www.computerworld.com\/article\/3042184\/security\/mac-ransomware-kerangers-flaws-could-let-users-recover-files.html\" target=\"_blank\">second such threat<\/a> found in the wild so far, and it&#8217;s a poorly designed one. The program was named OSX\/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.<\/p>\n<p> OSX\/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac. It is written in Apple&#8217;s Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3173165\/security\/new-macos-ransomware-spotted-in-the-wild.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11078,10439,10403,11073,714],"class_list":["post-6745","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple-mac","tag-encryption","tag-macos","tag-malware-vulnerabilities","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6745"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6745\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6745"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}