{"id":4104,"date":"2016-03-11T01:19:57","date_gmt":"2016-03-10T17:19:57","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4104"},"modified":"2016-03-11T01:20:09","modified_gmt":"2016-03-10T17:20:09","slug":"mac-os-x-ransomware-keranger-linux-encoder-trojan","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/03\/mac-os-x-ransomware-keranger-linux-encoder-trojan\/","title":{"rendered":"Mac OS X Ransomware KeRanger Is Linux Encoder Trojan"},"content":{"rendered":"

So there’s been a fair bit of noise this past week about the Mac OS X Ransomware, the first of its’ kind called KeRanger. It also happens to be the first popular Mac malware of any form for some time.<\/p>\n

It’s also a lesson to all the Apple fanbois that their OS is not impervious and this was bundled with legit software (Transmission<\/a>) and bypassed the Gatekeeper protection as it was signed with a legit cert.<\/p>\n

\"Mac<\/p>\n

It turns out, basically it’s just the Linux Encoder Trojan<\/a> (the first Linux ransomware trojan) re-purposed for Macs, as well OS X is a *nix variant based on OpenBSD with a fancy window manager.<\/p>\n

The world’s first fully functional OS X ransomware, KeRanger, is really a Mac version of the Linux Encoder Trojan, according to new research from Romanian security software firm Bitdefender.<\/p>\n

The infected OS X torrent update carrying KeRanger looks virtually identical to version 4 of the Linux Encoder Trojan that has already infected thousands of Linux servers this year.<\/p>\n

KeRanger spread via an infected version of an otherwise legitimate open source BitTorrent application, Transmission. The tainted version (2.90) was available for download between March 4 and March 5, 2016 and came signed with a legitimate developer certificate.<\/p>\n

Apple’s OS X ships with a security feature called Gatekeeper, allowing users to restrict which sources they can install applications from in order to minimize the likelihood of deploying a malicious app. The default setting allows users to install applications from the Mac App Store or applications that are digitally signed by a developer.<\/p>\n

By using a developer certificate to sign their wares, the crooks behind KeRanger were able to circumvent Apple’s GateKeeper control. Apple has since revoked the misused certificate, which was issued to a Turkish firm, so the immediate panic is over.<\/p>\n

However, similar attacks along the same lines might easily re-appear, so merely disallowing unsigned software from running on Macs is no defense.<\/p><\/blockquote>\n