Life has changed there is no doubt and we wanted to reach out to see how you are doing.
As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!
Computer Security
If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.
What can you do about it?
I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.
Now offering consultations to give you the best protection possible:
404.229.0839
carlthorne@hthcatlanta.com
Jack of All Trades, Master of Many
Jack of All Trades, and Master of Many
We provide technical support for:
Homes and small businesses
Windows and the Mac OS platform
iPhones and Android Smartphones
Wireless and wired networks
New device setup
Old device upgrade or repair
One-on-one training
Remote assistance
How To Stop Malware
Home
»
Safety
» Ransomware on the Mac: Turns out identify theft is a problem for apps, too by Rob Pegoraro
9:55 AMHigh Tech House Calls, Expert Computer Consulting
Back in the mid-1990s, when Apple was unquestionably doomed,
I would joke that the near-complete lack of viruses for its computers
represented yet another example of developers unfairly ignoring the Mac
in favor of Windows.
These days, nobody would get that joke. Apple is printing money, and the Mac now has its share of malware. The latest case: A bit of ransomware, discovered last weekend, which used a form of identity theft to fool OS X’s security system.
How this happened
This crime had two victims. One was the well-regarded BitTorrent client Transmission,
which was hijacked by some still-unknown attackers. The other:
Transmission users who downloaded what they thought was a minor update
and instead saw their files encrypted by its malicious code until they
paid a ransom of 1 bitcoin (about $411 at current exchange rates).
Windows users are all too familiar with the ransomware routine,
in which malicious code silently encrypts files on your computer and
its attached drives and then gives you a few days to pay for a key to
unlock them. If you don’t knuckle under in time, the attackers delete
the key, and your data’s gone.
The
ransom often “only” costs from one to three bitcoin. But this winter,
the Hollywood Presbyterian Medical Center in Los Angeles paid a ransom of 40 bitcoin — about $17,000 — after unspecified ransomware infected its network.
In the Transmission case (which was first reported by Palo Alto Networks),
the attackers hacked the developers’ site and posted a compromised
version of that app containing code that Palo Alto christened
“KeRanger.”
By default, OS X’s Gatekeeper security
only allows apps signed by their developers with digital certificates
issued by Apple to run. (It’s possible for users to circumvent that
system with a right-click, which is both easy and sometimes necessary in order to run apps from small shops.) But whoever posted the poisoned version of Transmission was able to sign it anyway by using another developer’s certificate.
“We’re
not commenting on the avenue the attackers used to compromise the Web
server, but to be clear: the certificate used to sign the compromised
binary was not our certificate,” Transmission’s John Clay said in an
e-mail. “It was a certificate obtained through Apple by another party,
perhaps fraudulently.”
After
Palo Alto Networks informed Transmission and Apple, the former removed
the KeRanger-infected download and the latter revoked that certificate.
(Apple PR declined to answer an e-mail sent Monday asking for comment.)
Why it will probably happen again
An
attack like this works because it takes advantage of a key rule for
staying safe online: Don’t talk to strangers. Because we don’t have time
to run a background check on every app developer, we count on systems
like Gatekeeper to filter out the evil ones. (Historically, Google’s
Android worked in a similar way, but in the last couple of years it’s added automated and human malware screening.)
If that line of defense leaks, good luck spotting anything awry.
“The
only way for a user to notice this is to notice something fishy about
the owner of the certificate when they install,” wrote Steve Kelly,
president of the Mac-security firm Intego. “That’s quite likely to squeak by a lot of users.”
(Ryan Olson, director of threat intelligence at Palo Alto Networks, said a firewall configured to block the anonymous and encrypted Tor network that KeRanger employed to get its encryption key would also have worked. We all totally know how to do that, right?)
Online
thieves will keep trying this tactic because it works. As Olson wrote
in an e-mail: “Attackers know that being embedded in legitimate software
helps them infect more people.”
For
example, a few weeks ago attackers uploaded a compromised download of
an entire operating system — Linux Mint, a beginner-friendly version of
the open-source Linux software — and hacked the real thing’s site to point to the poisoned version.
The
way anybody can inspect and edit the code of open-source projects like
Transmission and Linux Mint may make them easier targets, Intego’s Kelly
said. As somebody who frequently uses and endorses open-source software
— I rely on one such tool to encrypt and decrypt some e-mail messages — I did not find that comforting.
As
that example should illustrate, retreating inside the walls of app
stores cannot guarantee security either. And in OS X, Apple’s Mac App
Store makes an even less likely refuge.
As my colleague Dan Miller wrote in December,
the limits Apple imposes on other people’s apps but not its own,
combined with a slow and arbitrary review process that holds up even bug
fixes, is pushing developers away from that outlet.
You
can, I guess, wait to install each app’s latest update until other
people have vouched for it as safe. But what if that update’s advertised
feature is itself a security fix that will close a critical
vulnerability in the current version?
I don’t have a good answer for that — and I don’t like that at all.
For your convenience Venmo and Zelle are also accepted for payment.
Fed up with Windows based computers?
Think an Apple Computer might be what the doctor ordered?
We can help you with that decision for free! Give us a call so we can discuss your computing needs!
Gift Certificates
What will you use your certificate for?
Making the move to an Apple laptop? My business has been running on an Apple laptop for 6 years.
You bought an iPhone. Now what? We have been working on iPhone problems since they came out and we can help.
Summer will be here before you know it. You want to surf on the internet on your wireless network from your pool. We are wireless network experts in both design and deployment.
Or you can use this gift card for any help needed (including training) for the computers in your home or small business.
The perfect present for any occasion:
Available in one hour increments.
No expiration date.
Can be used for service calls or training.
Giving a technology gift that requires setup or training? Why not add a gift certificate?