The first malware affecting Apple systems has been discovered. It’s called KeRanger and it’s a ransomware for Mac OS that encrypts data, making the computer inaccessible unless a ransom is paid.
It rained what it threatened. The first arrivesransomware that hits theMac system, known for its invulnerability. KeRanger, this is the name of themalware, it only hitsMac computers by encrypting the data on the computer in order to make it inaccessible. Subsequently, as happened with thealter egos of theWindows system, for unlocking, hackers demand a ransom to be paid via the Internet (bitcoin).Â
I Ransomware aremalware that always have one characteristic in common: paying the ransom to unlock the data “taken hostage”. However, the payment of the ransom does not always restore the computer’s situation to what it was before the attack. There are different schools of thought on this.Â
Some are led to believe that paying the ransom is useless because “computer pirates” are not “gentlemen” who, after obtaining the loot, bother to restore the computers’ situation before their attack. Others, however, are certain that since hacking data is not useful to hackers, once they have received the ransom, they are interested in decrypting the data “taken hostage” to encourage others to do so.
Â
However, after the vulnerability was discovered,Apple has already taken steps to remedy the situation by removing the certificate used during the attack and updating the anti-malware systemXProtect with a new signature to protect its customers.Â
According to security professionals, this is not the first malware to hitMac systems to be discovered, but the previous one, namedFileCoder, was incomplete and therefore not yet effective as a threat. Â
KeRanger, according to what is learned from Palo Alto, has hit a limited number of computers although a precise estimate has not yet been provided. Apple computer owners are advised, of course, to update the anti-malware system Apple, are advised, of course, to update the anti-malware system XProtect.
To check if your computer is infected with the malware, follow the technical procedure made available directly by Palo Alto Inc..
Pubblicato in Guides & Tutorials
Be the first to comment