Skip to main content
X

Send us a Topic or Tip

Have a suggestion for the blog? Perhaps a topic you'd like us to write about? If so, we'd love to hear from you! Fancy yourself a writer and have a tech tip, handy computer trick, or "how to" to share? Let us know what you'd like to contribute!

Thanks for reaching out!

KeRanger Ransomware: What It Is and Why You Shouldn’t Be Too Worried About It

On March 4, 2016, Palo Alto Networks sent out a warning about a new piece of ransomware that affected Mac OS X. The ransomware was named KeRanger, was infecting installers for the popular open source BitTorrent app Transmission, and as you’d expect with something called “ransomware”, it encrypted the users’s data and then demanded payment in the form of one bitcoin (about $400). Should you be worried about KeRanger? No, since it’s already been shut down by Apple, but you should take care to prevent a similar future piece of malware from ruining your day.

KeRanger infected installers downloaded from Transmission's website
KeRanger infected installers downloaded from Transmission’s website

Normally, your Mac protects you from possible malware through File Quarantine. This piece of security software is what warns you that you’re about to launch an application that you downloaded from the Internet. Most of the time, you are aware that you’ve downloaded an app from the Internet, and you’re also quite willing to install it.

Next, if File Quarantine sees that the app you’re launching is included in the XProtect malware definitions, you get another warning — much more severe in tone — that tells you what malware is about to attack. Well, KeRanger had been signed with a valid Mac app development certificate, so it was able to easily bypass the usual Mac Gatekeeper protection mechanism. Those who were unlucky enough to have downloaded the infected Transmission app installer between 11 a.m. PST on March 4 and 7 p.m. PST on March 5 got to sit by helplessly while their data was encrypted and they were told to “send money” to get it unlocked.

Fortunately, Apple has revoked the developer certificate and also added KeRanger to its malware definitions list over the weekend, so your Mac is currently pretty safe from this nasty piece of work. Those malware definitions are auto-uploading on your Mac, and XProtect has been part of OS X since version 10.6 Snow Leopard. By the time most people even heard about KeRanger, they were already protected from it.

Let’s think about how those affected by KeRanger could have responded instead of paying ransom, and how you can stay away from future ransomware. For those who were affected by KeRanger, the best thing they could have done was to immediately shut down their Mac, install a new clean copy of OS X from the Recovery Partition or from an install flash drive, and then recover their data from Time Machine or another backup.

Palo Alto Networks notes that the attackers might be trying to figure out a way to encrypt users’ Time Machine backups as well, which would make it even harder to recover from a future version of KeRanger. So how could you stay safe from ransomware like this?

There’s a relatively easy way to make sure that your backup would be safe from ransomware, and that’s to make a daily bootable backup with Carbon Copy Cloner or SuperDuper!, and then unplug the drive you’ve made the backup onto. Should ransomware infect your Mac and your constantly-running Time Machine backup, you’d still have a clean backup that you could use to get back to business quickly.

Is there any way you can totally protect yourself from malware like KeRanger? Yes, if you only install apps from the Mac App Store where they’ve been vetted and checked for malware prior to their release to the public. Sadly, a growing number of disgruntled app developers are moving their apps from the Mac App Store to their own online web stores, citing the inability to offer free trials of software in the App Store and slow approval of new or updated apps.

As it is, if you did download the Transmission installer recently and haven’t launched it yet, you probably want to download a new copy of the installer. If you happened to get the bad copy a second time, a message similar to the one seen below will appear on your Mac:

Image courtesy of Palo Alto Networks
Image courtesy of Palo Alto Networks

This should be your clue to delete the installer immediately. Palo Alto Networks also provided some good instructions on its website regarding specific files that should be removed and processes that should be force quit in case of an infection with KeRanger.

Keep your backups up to date, watch out for suspicious app installers, and be sure to have a backup drive that’s not connected to your Mac. We at the Rocket Yard want you to be safe!

Steve Sande
the authorSteve Sande
Contributing Author
Steve has been writing about Apple products since 1986, starting on a bulletin board system, creating the first of his many Apple-related websites in 1994, joining the staff of The Unofficial Apple Weblog in 2008, and founding Apple World Today in 2015. He’s semi-retired, loves to camp and take photos, and is an FAA-licensed drone pilot.
Be Sociable, Share This Post!

Leave a Reply

3 Comments