Issues Raised By Apple Ransomware
We have long believed Apple to be impenetrable, but this is no longer the case…
Apple customers have always considered themselves to be largely insulated from the worst excesses of computer viruses and malware. While PC users spent the Noughties battling worms and Trojans, Mac users felt able to surf the internet and open unsolicited emails with far more confidence.
In part, this was because the creators of viruses always wanted to infect as many machines as possible. Apple remains a minority platform, so worms like Sasser and SQL Slammer achieved maximum impact by targeting Windows services and packages respectively. Apple software was historically regarded as more securely designed than its Windows rival, with no root privileges and password entry required before a system could be reconfigured. That perception of safety persisted for years, despite the fact that some experts have identified more vulnerabilities in Mac OS X than in recent generations of Windows.
By 2012, it was becoming increasingly evident that Apple computers were also susceptible to malicious software. Trojans began exploiting flaws in Java, while backdoor applications were launched that could seize control of a machine without requiring authentication. Earlier this month, the stakes were raised further by the first confirmed cases of Apple ransomware – known as KeRanger – and transmitted through Bit Torrent networks. As with similar PC attacks, this Mac-only ransomware effectively locks down the computer until a fee of one bitcoin (an untraceable digital currency currently worth around £290) is paid.
Ransomware has been defined as one of the world’s leading cyber-threats by the UK’s National Crime Agency, and the increasing market share enjoyed by Mac OS is making this a more lucrative sector than was previously the case. It’s difficult to identify KeRanger’s presence straight away because initial infection is followed by a 72-hour period of dormancy. File encryption is then declared to the user, which can only be reversed with an electronic key provided by the criminals.
Despite quietly dropping its historic mantra that Mac users don’t need to run antivirus software, Apple’s track record of fixing known security breaches is inconsistent. It was over six months before the Rootpipe security flaw was resolved in OS X Yosemite, and a BIOS vulnerability was initially ignored by Apple last summer when it was identified by a Portuguese security researcher. There is also a wider issue that third-party programs like Java can contain flaws outwith Apple’s control. Although KeRanger has now been tackled with software updates and patches, its brief but undisputed success could inspire other cyber-criminals to target Mac computers in future.
It’s estimated that 98% of viruses target Windows or Android platforms, but that still means roughly five thousand OS X-based viruses are created and launched each year. To avoid falling foul of KeRanger or other malware, Mac users should keep both their OS and individual apps up to date with the latest patches. Security experts recommend antivirus products should be installed, with Kaspersky and Symantec packages achieving a 100% detection rate in recent testing. Unknown email attachments and links should be ignored or deleted at all times, while apps of dubious quality should also be avoided even if they’re available in the official App Store.
Learn more about the security that can’t be beat at VPS