KeyRanger- How Did the Hacker’s Get In?

Mar 7, 2016 | Security Tips | 0 comments

KeyRanger – How Did the Hackers Get In? Hackers infected Macs through a tainted copy of a popular program known as Transmission a BitTorrent, which is used to transfer data through the peer-to-peer file sharing network. When users downloaded version 2.90 of Transmission, which was released on Friday, their Macs were infected with the ransomware.

“KeRanger” is programmed to stay quiet for three days after infecting a computer. Then it will connect to the attacker’s server and start encrypting files so they cannot be accessed. After encryption is completed “KeRanger” demands a ransom of 1 Bitcoin approximately $565 cdn.

How to Protect Yourself While Apple has taken steps to prevent further infections, this will do nothing to protect systems that have already been hit with the malware. Users who have directly downloaded Transmission installer from official website on March 4th will want to refer to Transmission for the proper security checks and install Transmission 2.92 which should automatically remove KeRanger.

With this recent KeRanger attack on Apple and the momentum that ransomware has been making, we strongly suggest reading our blog on tips to avoid ransomware

This IT Security Tech Tip brought to you by BlackBox Connections.

You Want Secure IT with Fast Response at the Best Price!
We are featured on Page 101 in the March ‘Business In Calgary’ magazine