Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Does anyone have any recommendation on how to prepare for a ransomware attack? Let's say hypothetically I'm infected, aside from full backups, what other steps can I take?
Regular backups are the best protection.
If I keep most of my important files on Dropbox, should I be okay?
Relying only on Dropbox is actually a bad idea, since the ransomware would probably encrypt the files in your Dropbox folder, from where they would propagate to all your other devices (although depending on how the ransomware works, you may be able to retrieve the unencrypted files using Dropbox' versioning feature on their web page). Always keep offline backups of the files as well.
 
  • Like
Reactions: ratsg and leftynaut
I wonder how the developers will handle the first case of a user's system being compromised. Would the developers be considered at fault as it was their servers and their website that allowed the download, or would the blame fall to the user for installing via a website instead of through the App Store?
Malware in the past has been distributed via the App Store too. I guess the only liability lies on the authors of the hack unless maybe the server was so insecure to constitute gross negligence? I doubt it and I'm not even sure it would be a realistic case even if it were indeed blatantly insecure.
 
Does anyone have any recommendation on how to prepare for a ransomware attack? Let's say hypothetically I'm infected, aside from full backups, what other steps can I take? If I keep most of my important files on Dropbox, should I be okay?

I would treat it (and prepare for it) like any other catastrophic loss scenario. Suppose your computer was stolen tonight, or it fell off the desk and corrupted the hard drive. Would you be able to recover? If the answer is no, then I'd do something about it.

Personally I find the SSD drive on my rMBP so small that I end up regularly putting stuff on external HDs just to offload them. I would lose close to nothing if my rMBP was compromised. Now to physically protect the backup drives...
 
why couldn't they have increased security before the attack? Seems to be the go to line for companies saying how something like this won't happen again.
Because the attackers used a security hole that they didn't know about.

Even if they knew about it, I doubt anyone would have expected OS X freeware from a reputable developer to be an obvious target.
 
  • Like
Reactions: ignatius345
I disabled all automatic updates.
Good to be safe -- though if you hadn't, you'd be among those who weren't effected. The less lucky downloaded the install file and ran it -- that's when the ransomware was installed. Those who autoupdated are OK.
 
Guessing the guys that think torrenting is strictly for piracy are the same guys that think an FBI backdoor gives us more freedom...

Torrenting is used overwhelming for pirating. I have zero sympathy for those that pirate.

I also side with, and feel as strongly as Tim Cook about Apple's stance in the FBI issue.
 
I wonder how the developers will handle the first case of a user's system being compromised. Would the developers be considered at fault as it was their servers and their website that allowed the download, or would the blame fall to the user for installing via a website instead of through the App Store?
In this case it wasn't possible to install from the app store, since Apple doesn't allow Bittorrent clients on the store for some reason. So I guess you could also blame Apple. ;)
 
And of course main stream media picks up on the story and totally spins it to look like Macs are not safe anymore. No mention of transmission or the fact that the user has to go out of their way and download a bad update from a 3rd party website.
 
I disabled all automatic updates.
Apart from that in this case only the manual downloads were affected, not having automatic updates also means you would not be getting the update that includes a malware removal tool. Generally, the likelihood that updates fix security issues is much higher than that they introduce them. An argument can be made to wait a short time after the release of any update (with a longer time more appropriate the more substantial the update is) but this requires active monitoring of any discovery of issues for every software update.
 
First off - I have never been a fan of any torrent site or applications. I get all my files from legitimate sources and I pay for my music/videos. Unfortunately, the only time I find myself firing up a torrent engine is if I need a linux ISO that is only available via torrent downloads.

How did this occur? It seems someone took control of their update server, and put the nefarious code in there. Word to the wise? Just don't torrent at all.
 
Does anyone have any recommendation on how to prepare for a ransomware attack? Let's say hypothetically I'm infected, aside from full backups, what other steps can I take? If I keep most of my important files on Dropbox, should I be okay?

The most important thing to do is to make sure you have at least one offline backup.

For example, if you have a Time Machine backup that is online, ransomware can encrypt it as well as the main copy of your data, screwing you over.

Even if you don't make the offline copy of the data that often (once a week or month) it's better to have that than nothing at all in case of data loss that takes out all your online copies. Some randomware out there will even go out and start encrypting stuff on network shares. It can be pretty insidious.
 
Glad I don't need this software anymore. In college I had no money and was learning software to prepare me for my future career. Now I pay for all of my software and have no need for Transmission. It was still on my personal Mac but wasn't updated and now I can just delete it. Glad I don't need it because it was one of the best and I'm not sure what I would use in it's stead. Haven't torrented in ages.
 
First off - I have never been a fan of any torrent site or applications. I get all my files from legitimate sources and I pay for my music/videos. Unfortunately, the only time I find myself firing up a torrent engine is if I need a linux ISO that is only available via torrent downloads.

How did this occur? It seems someone took control of their update server, and put the nefarious code in there. Word to the wise? Just don't torrent at all.

Any other program on OS X that is distributed outside of the MAS could have easily been targeted by the exact same compromise.
Transmission was probably picked because it is popular and has a expansive audience - the fact that you don't torrent doesn't mean that you are a better person who is immune to having the good swapped out without your knowledge. The practical usages of this application are completely irrelevant.

How many applications on your computer, not from the MAS, are popular? Now how many of them could potentially have had their servers compromised by intruders without your knowledge? How many of them have their servers compromised with your knowledge?
 
Last edited:
  • Like
Reactions: ignatius345
I like that the Transmission developers built-in a solution to the problem into the update, instead of just telling users to get an anti-virus to figure it out. This is good of them, and something that I don't ever see in the Windows world.

Absolutely.

This was a breath of fresh air:

On Sunday, Transmission's developers released software updates to block the malicious software and to remove it from the Macs of users who had unwittingly installed the malicious version. Apple also updated its software protections to keep the malware from affecting Mac users and to prevent the bad version from being installed on additional machines.

Everyone basically came together and said "Right, let's fix this fast," and they did. That's awesome.
 
Torrenting is used overwhelming for pirating. I have zero sympathy for those that pirate.

First off - I have never been a fan of any torrent site or applications. I get all my files from legitimate sources and I pay for my music/videos.

I also have ZERO sympathy. But for people who know very little or who are completely oblivious to the real world use of torrenting and comment like they are in the "know" and lift their noses in disgust. I have several clients and collaborators who I constantly share very large files with. Many of my clients are game developers and video editors and they deal with large chunks of files that are much easier and quicker to download as a torrent as opposed to a large single file when collaborating.

Here are just a few examples of LEGAL everyday uses of torrenting:

  • Blizzard Entertainment uses its own BitTorrent client to download World of Warcraft, Starcraft II, and Diablo III games. When you purchase one of these games and download it, you’re actually just downloading a BitTorrent client that will do the rest of the work.
  • Facebook and Twitter Use BitTorrent Internally
  • Many government agencies use torrent files.
While yes, most pirated items are shared and downloaded via torrent files, not all torrent files are used for pirating. That's like saying that most car thieves use coat hangers to break into cars so anyone who uses a coat hanger must be a thief. Please!
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.