This week two new ransomware attacks have been detected, affecting both Mac and PC users. Ransomware has been a popular criminal business model targeting Windows users for while now, but a new ransomware, called KeRanger, is the first to specifically target Mac OS X machines. Meanwhile, in the world of Windows, PETYA, is a new and well-disguised ransomware affecting many unsuspecting victims.

What is ransomware?

Ransomware is a kind of a malware which imposes a lockout, preventing you from being able to use your computer until you pay a ransom or risk having your data completely wiped after the lockout period.

Both KeRanger and PETYA give victims a lockout window before total data destruction, demanding a ransom of 1 bitcoin to be paid (approximately 560.23 AUD at the time of writing).

Petya or Petrwrap Ransomware attack

Am I at risk?

Mac Users

The KeRanger malware was first discovered in rogue versions of Transmission, a popular BitTorrent client. Shortly after the discovery, Transmission requested all users running the version immediately upgrade or delete their copy, in case they have downloaded a malware-infected file.The attack is another demonstration of the risks involved with peer to peer file sharing, such as bit torrent. Whilst this particular attack has been limited to the Transmission bit torrent client, it is now not so hard to expect that future attacks may be spread through other file and email methods.

For Mac users, now is the time to be more vigilant about opening email attachments and website downloads.

PC Users

For those of you on PC, although ransomware is not new, it is now hiding in otherwise legitimate places! The nasty new ransomware, PETYA had been found disguised in an email disguised as a Job Applicant’s CV. The email links to a Dropbox folder containing the applicant’s ‘Curriculum Vitae’ which instead downloads the malicious file.

 

petya_figure1

PETYA warning screen. Source: TrendMicro

What can I do about it?

Back up, back up, back up! The only foolproof defence against these attacks is a regular offline backup. This means a back up that is not constantly connected to your computer.
If you are unsure if you have this in place, or need help setting up an offline back, please feel free get in touch.

For our clients with a Mac Aid Monitoring service, a report will be received if you have been affected by ransomware so that it can be resolved as soon as possible.

In case you missed Apple’s launch last week, here’s a recap of their new Autumn range.

 

Apple Watch

Since the announcement last week, Apple has dropped the price of their Apple Watch. You can now grab an Apple Watch Sport from $429 for the 38mm model or $499 for the 42mm model.

Screen Shot 2016-03-24 at 1.14.18 pm

Apple has also increased the personalisation of the Watch, with the release of a new range of bands. You can use their interactive gallery to personalise your look here.

iPad Pro 9.7″

When Apple announced the iPad Pro last year many were excited to try out the new Apple Pencil and larger work space. For those, however, who may have been deterred by the massive 12.9” inch size of the original iPad Pro, Apple has just released a new 9.7” model.
Screen Shot 2016-03-24 at 1.16.46 pm
The new 9.7” iPad Pro is the same size as an iPad Air, features the same A9X chip as the original iPad Pro with a superior 12.7 mega pixel camera.
Orders for the iPad Pro 9.7” are now open and will be available from the 31st of March, starting at $899 for the 32GB model.

iPhone SE

Just when it seemed phones were getting bigger and bigger each year, Apple took a step back and released a new 4” iPhone. Featuring the same screen size as the iPhone 5 and the brains of an iPhone 6, users of iPhone 5 and 5s can now upgrade their phone without having to switch to a larger model.
Screen Shot 2016-03-24 at 1.19.16 pm
The new iPhone SE starts at $679 and will be available from March 31st.

 

iOS 9.3

The new operating system for iPhones and iPads is now available for download. Featuring Night Shift mode, a new Notes app and enhancements for Apple News and CarPlay you can install the free update now by going to Settings > General > Software Update.
Screen Shot 2016-03-30 at 5.00.38 pm
With the release of the new iOS 9.3 operating system, many users were stumped to remember their Apple ID password after the update. 

 

Screen Shot 2016-03-24 at 1.13.16 pm

 

Luckily, there’s a simple, yet a little known way to retrieve and reset your password. All you need to do is head to http://iforgot.apple.com

Once you’ve arrived at Apple’s recovery page, just type in your Apple ID and you can choose to either answer your security questions or have reset instructions emailed to a recovery email address, if you have previously supplied one.

 

Screen Shot 2016-03-24 at 12.58.59 pm

For some of us, it’s not just the password we’ve forgotten, but also the ID itself! If this is the case, all you need to do is click on Forgot Apple ID? Here you’ll be prompted to enter your full name, email address and let Apple work it’s magic to find your Apple ID.

Looking for an extra level of security?

Apple has recently introduced a new 2-step authentication procedure for resetting you Apple ID password. This added security means in order to reset your password you will need a Recovery Key or a second device (such as an iPhone) to verify your authentication. You can set up your Two-Step Verification by signing in to your Apple ID account at: https://appleid.apple.com
 
 
Please Note: There are some extreme cases where the email happens to be no longer used, or the Apple ID just refuses to reset.
In these cases, it is best to call Apple directly.

This week a new ransomware has been detected, affecting some Mac users. Ransomware has been a popular criminal business model targeting Windows users for while now, but this new ransomware, called KeRanger, is the first to specifically target Mac OS X machines.

What is ransomware?

Ransomware is a kind of a malware which imposes a lockout, preventing you from being able to use your computer until you pay a ransom or risk having your data completely wiped after the lockout period.

The KeRanger malware waits dormant in affected machines for 3 days before requesting the ransom. KeRanger then gives victims a 72-hour lockout window before total data destruction, unless a ransom of 1 bitcoin is paid (approximately 552.41 AUD at the time of writing).

Am I at risk?

The KeRanger malware was first discovered in rogue versions of Transmission, a popular BitTorrent client. Shortly after the discovery, Transmission requested all users running the version immediately upgrade or delete their copy, in case they have downloaded a malware-infected file.

The attack is another demonstration of the risks involved with peer to peer file sharing, such as bit torrent. Whilst this particular attack has been limited to the Transmission bit torrent client, it is now not so hard to expect that future attacks may be spread through other file and email methods.

For Mac users, now is the time to be more vigilant about opening email attachments and website downloads.

What can I do about it?

The only foolproof defence against these attacks is a regular offline backup. This means a back up that is not constantly connected to your Mac.
If you are unsure if you have this is place, or need help setting up an offline back, please feel free get in touch.

For our clients with a Mac Aid Monitoring service, a report will be received if you have been affected by the KeRanger ransomware so that it can be resolved as soon as possible.

Lee is our newest tech who joined us in June 2015!
He identifies as a geek and loves or appreciates all things geeky including, but not limited to:
anime, superheroes, role-play games and electronic gadgets.
Lee especially loves video games, and even though his game library is not especially huge, he is proud of his vast game console collection. His most recent addition was an Xbox One. Lee’s favourite game is Super Smash Bros. and in the past he has played this competitively in tournaments.
576615_10150738285838331_1747162882_n

Fun facts about Lee: