Mac OS X Ransomware Infects Transmission Bittorrent Client

Status
Not open for further replies.

beayn

Distinguished
Sep 17, 2009
947
0
18,990
Why would this article post an untruth. Everyone knows Mac is completely immune to any security threat. ;)

They also don't have any problems at all.... despite having a 15% market share and being 30% of my workshop repair jobs...
 

alidan

Splendid
Aug 5, 2009
5,303
0
25,780
Why would this article post an untruth. Everyone knows Mac is completely immune to any security threat. ;)

They also don't have any problems at all.... despite having a 15% market share and being 30% of my workshop repair jobs...

im willing to bet money that's more on the people who buy macs over macs breaking more then pcs.
 

Haravikk

Distinguished
Sep 14, 2013
317
0
18,790
Jeremy, you beat me too it. I clicked on this article only to post that exact comment :)
Then you're both idiots; Macs are no less susceptible to comprised software or websites or even viruses, except that it's usually very hard to do anything that requires root access (even harder under El Capitan). Anyone that repeats the notion that Macs are somehow invulnerable is also an idiot, but parroting the phrase every time a Mac related malware article comes up is just as idiotic.


This ransomware can only encrypt the entire disk if the user enters an admin password (which Transmission doesn't need), so it's probably only encrypting files in their home folder, which can easily be recovered from a Time Machine backup.

I'd be interested to find out how they intend to encrypt Time Machine backups as well, as tampering with those is hard to do even as root as you have to use a specific bypass tool to do anything to them, and even then 90% of what you do do will have unexpected (usually destructive) results, though I suppose for ransomware purposes that's enough. Point being though that this would also require an administrator password at the very least, which means that the OS X security model is working just fine.

Gatekeeper is also not failing here; if you sign your software with a valid developer certificate then it'll let it pass, which is entirely by design so again, working correctly. However, Apple can revoke malicious certificates (and will presumably do-so in this case). You also have to pay for a developer license to get one, so unless they're using a stolen certificate Apple will also have details to track or send to law enforcement.

There may be an argument here that OS X should track certificates used to sign apps and flag any that have changed to a different developer unexpectedly.
 

apone

Distinguished
Sep 9, 2011
106
5
18,685
@ Haravikk

You do realize that Jeremy2020 and CousinIT were being sarcastic, right? They're basically pointing out the truth that countless idiots are clueless that the chance of infection ultimately comes down to the user's computing habits. But Mactards can't be bothered to understand that. According to them, infections happen because it's Windows but if it's OS X, then it's simply user error (ahem, "social engineering").

 

ammaross

Distinguished
Jan 12, 2011
269
0
18,790
Jeremy, you beat me too it. I clicked on this article only to post that exact comment :)
Then you're both idiots; Macs are no less susceptible to comprised software or websites or even viruses, except that it's usually very hard to do anything that requires root access (even harder under El Capitan).
Sarcasm. Heard of it?

This ransomware can only encrypt the entire disk if the user enters an admin password (which Transmission doesn't need), so it's probably only encrypting files in their home folder, which can easily be recovered from a Time Machine backup.
Privilege Escalation attacks. Heard of them? Thought not. Even easier to do from software already on the machine (as opposed to remote via open ports).

I'd be interested to find out how they intend to encrypt Time Machine backups as well, as tampering with those is hard to do even as root as you have to use a specific bypass tool to do anything to them, and even then 90% of what you do do will have unexpected (usually destructive) results, though I suppose for ransomware purposes that's enough.
I could dd to the sectors of the disk those time machine files are stored on and wipe them out quite easily....

Point being though that this would also require an administrator password at the very least, which means that the OS X security model is working just fine.
Until a rootkit or such nasty worms its way in via a privilege escalation vuln.

Gatekeeper is also not failing here; if you sign your software with a valid developer certificate then it'll let it pass, which is entirely by design so again, working correctly. You also have to pay for a developer license to get one...
So, a moderately useless security measure (no worse/better than Windows' code signing) and you have to buy a dev cert...

...so unless they're using a stolen certificate Apple will also have details to track or send to law enforcement.
Of course they're using a stolen cert.

There may be an argument here that OS X should track certificates used to sign apps and flag any that have changed to a different developer unexpectedly.
Because the virus writers are going to sign it with a new company name perhaps? How's Apple going to know that a cert is signing code from a different project vs a new build of an existing one? Not much thought in your comment there.

--- end retort --

The biggest weakness is obviously the user. Even if there's no magic sauce and all it does is corrupt Time Machine and encrypt pictures and documents local to the user, it still does damage and is still malware. Remember Mac vs PC ads? Apple has had a history of indoctrinating its users that because you're using Mac and not Windows, you won't get malware or viruses. This is only the beginning.
 

TEAMSWITCHER

Distinguished
Aug 7, 2008
206
5
18,685
Before this article was even published Apple took action to protect users. This was a socially engineered Trojan Horse, the likes of which are a common everyday occurrence on Windows. Only a tiny few users were affected, and if they kept their data in iCloud drive ($1/month for 50 GB), they will be able to do a clean install over the web and be back up and running in less than one hour.

I understand how much fun it is to poke Apple, but if you're using a Mac correctly...as most users are. Even when things go bad...it's not that bad. Can't say the same thing for Windows...just reinstalling Windows and applying updates could take hours....typing in long CD KEYS...reinstalling apps...Ugh.
 

apone

Distinguished
Sep 9, 2011
106
5
18,685
@ Teamswitcher

Oh please, OS X has no shortage of critical security & bug fixes, OS updates, and it's funny how Apple is nonchalant about how indicating how critical it is to stay on top of installing them. At least Microsoft points out the urgency of getting it done.

And the same thing can be said about Windows. If you use it correctly, then you shouldn't have any infection issues. You can also utilize a 3rd party back up software (e.g. EaseUS, Paragon) or a cloud-based solution (e.g. Microsoft One Drive) to take care backing up and restoring your computer. Funny how many of the same features Mac users praise end up being the same existing features Windows already has (or can be easily obtained).
 

ErikVinoya

Honorable
May 11, 2014
202
0
10,710
Then you're both idiots; Macs are no less susceptible to comprised software or websites or even viruses, except that it's usually very hard to do anything that requires root access (even harder under El Capitan). Anyone that repeats the notion that Macs are somehow invulnerable is also an idiot, but parroting the phrase every time a Mac related malware article comes up is just as idiotic.

What about people who can't take jokes? are they idiots/idiotic too?
 
Status
Not open for further replies.