Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.



Over the weekend, the first instance of Mac ransomware was found in a malicious update to the Transmission BitTorrent client. Version 2.90 of Transmission downloaded from the Transmission website was infected with "KeRanger" ransomware.

"Ransomware" is a class of malware that encrypts a user's hard drive and files, demanding money to decrypt it. In this case, KeRanger would have required Mac users to shell out a bitcoin for decryption, equivalent to approximately $400.

Article Link: Transmission Malware Transmitted Through Server Hack, Downloaded 6,500 Times

In the pre-ransomware days I was a very high level systems administrator for a truly huge software/hardware company and that experience, along with the twenty or so years prior writing OS software for another big hardware vendor, caused me to not look fondly on "a new release of xyz is available" messages.

The sad truth is consumers haven't had the experience of blindly upgrading to the "latest and greatest", then having the entire world fall apart around them. They honestly believe the next release is always better than the last one, even if they aren't having problems with the last one. This sort of exploit was created by companies like MS and Apple with their automated software update process. I'm proudly running MacOS 10.6.8 on eight machines and two geographically separate networks. You can pry it out of my cold dead fingers :) It does what I want done and I've learned to work around the bugs (like having to set my system clock to 2012 before re-installing it).

This doesn't have anything to do with Tor or Torrent, it has to do with poor operational security. You just don't download stuff off the net and try it on the crown jewels to see what it does. If you're going to use experimental software from sources you either can't or don't trust, you put it on an expendable machine , isolate if from your network, and run it for awhile before you turn it loose in the kitchen. It's just common sense folks. Most everyone this day in age has a laptop in the closet they don't use for real work anymore; that's your lab machine.

Use it. It could easily save you $400 and a whole lot of time.
 
Absolutely.

This was a breath of fresh air:



Everyone basically came together and said "Right, let's fix this fast," and they did. That's awesome.
I'm surprised the 'hackers' didn't disable the auto-update code. But it's still not going to help those already compromised.

Will only add more fuel to Apple wanting to exclusively sign all Apps from via AppStore.
 
Sorry if this was asked already. If you are using a standard user account would you be affected? I didn't think transmission needed admin rights to install? Thanks!
 
You listen Apple? This would not happen if you made it possible for Torrent Client authors to use your App Stores...

Blame Apple because users installed 3rd party s/w?

The blame is squarely on Transmission devs. It was their server that was hacked into. Mac's were merely a conduit here. Do you blame the power company when lightning hits your house and fries all your electronics?

Understand and take responsibility for the s/w you install. Apple isn't your guardian.
 
  • Like
Reactions: Max(IT)
why couldn't they have increased security before the attack? Seems to be the go to line for companies saying how something like this won't happen again.
Because it costs money
[doublepost=1457394674][/doublepost]
I wonder how the developers will handle the first case of a user's system being compromised. Would the developers be considered at fault as it was their servers and their website that allowed the download, or would the blame fall to the user for installing via a website instead of through the App Store?
It's free software so the company didn't earn anything from the user though.
 
Not sure why you're asking for something aside from full backups - that is the clear answer. And not just full backups, but disconnected full backups are important as ransomwear often tries to compromise backups and network drives too.

Yes, keeping several independent backups is important. I try to keep a habit of putting family photos and videos on write-once discs, bluray media is really inexpensive these days so I keep some copies at relatives as well in case my house is destroyed in a fire or whatever. Incidents like this, with Transmission (as mentioned elsewhere, could have been any type of program) motivates me even more to make proper backups.
-
BTW, all you who say only buy programs from App store, most of the programs I use are free - and often better for my needs than commercial programs. Many programs I use wouldn't even be accepted by App store. This ransomware attack could cause problems for many legitimate and proper open source programs, if the hack is modified and spread. It has little or nothing to do with torrenting (but it must be said that even Macs suffer from trojans and infected downloads, not like Windows, but still).

I assume "bigger" programs have better protection (can't bet on it though), but what if the program had been Handbrake, Audacity, Kodi, VLC, Libreoffice, Avidemux, Thunderbird, all these can be downloaded from many sites, legally, and if they are signed with apple certificates most people would install them thinking they were the real thing.

So this ransomware issue is a problem for most Mac users I reckon. I often try to find and download free software from App store, but, most programs I need aren't there.
 
  • Like
Reactions: oneMadRssn
Does anyone have any recommendation on how to prepare for a ransomware attack? Let's say hypothetically I'm infected, aside from full backups, what other steps can I take? If I keep most of my important files on Dropbox, should I be okay?
Full backup is easy to do. Just make sure they can't also encrypt your backup.
 
Does anyone have any recommendation on how to prepare for a ransomware attack? Let's say hypothetically I'm infected, aside from full backups, what other steps can I take?
You can create a new standard user (non-admin) account on your machine (System Preferences).

In the following example the short name of the new account is "nonadmin" and I open iTunes with the privileges of the "nonadmin" user .

In the Terminal type:
Code:
sudo -u 'nonadmin' /Applications/iTunes.app/Contents/MacOS/iTunes &
and hit enter! (tested on OS X 10.11.3)

Then close the Terminal tab/window and ignore the warnings! iTunes runs now with the privileges of the "nonadmin" user (see Activity Monitor).

Each account has a different preferences directory, so that you need to set the preferences for your app (iTunes in this example). For the highest security set the download directory to something like:
/Users/nonadmin/Downloads

Open also the Finder info window for each external volume and allow only read/write access for the admin user on your machine.

The malware cannot write encrypted data to directories/files which do not belong to the "nonadmin" account or which require an admin account.

If I keep most of my important files on Dropbox, should I be okay?
No, cloud storage services upload the encrypted files to your cloud storage, so that does not help.
 
Just deleted every third party app (excluding Origin and Steam games) and also updated all my security in preferences. LOL. Hell no, this damn Mac was expensive enough.

tumblr_newbwiPqVh1ql5yr7o1_500.gif
 
I installed Transmission on Friday, and luckily I managed to install it a mere 30 minutes BEFORE the malware got uploaded. Talk about cutting it close.
 
I also have ZERO sympathy. But for people who know very little or who are completely oblivious to the real world use of torrenting and comment like they are in the "know" and lift their noses in disgust. I have several clients and collaborators who I constantly share very large files with. Many of my clients are game developers and video editors and they deal with large chunks of files that are much easier and quicker to download as a torrent as opposed to a large single file when collaborating.

Here are just a few examples of LEGAL everyday uses of torrenting:

  • Blizzard Entertainment uses its own BitTorrent client to download World of Warcraft, Starcraft II, and Diablo III games. When you purchase one of these games and download it, you’re actually just downloading a BitTorrent client that will do the rest of the work.
  • Facebook and Twitter Use BitTorrent Internally
  • Many government agencies use torrent files.
While yes, most pirated items are shared and downloaded via torrent files, not all torrent files are used for pirating. That's like saying that most car thieves use coat hangers to break into cars so anyone who uses a coat hanger must be a thief. Please!

I don't know about the government agency use cases, but the other examples you gave (of which I was already familiar) are situations where torrenting is used as an implicit, under-the-covers technology to solve a specific issue and ones that are not seen by the user nor will they be impacted by this corrupted client. That's a far cry from someone downloading a torrent client onto their machine to use explicitly. Granted, there are legitimate uses for explicit torrenting, but the vast majority of people that download torrent clients onto their machines are doing it to steal music, movies, or other content that they should be paying for:
The data is out there. Most firms that research this data see such a preponderance of copyright infringement on p2p/bittorent networks, that they equate a rise in file sharing with a rise in piracy.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.