Apple-certified ransomware affected fewer than 7,000 computers
Downloads of KeRanger-infected Transmission BitTorrent client less widespread than feared


KeRanger, the first fully-functional Mac OS ransomware found in the wild, only affected about 6,500 computers, it has been claimed.
Speaking to Forbes, John Clay of the Transmission Project, which hosted the ransomware-infected files, revealed the site's main server had been compromised, allowing the attackers to distribute their malware in the guise of a legitimate Transmission BitTorrent client download.
However, Clay claimed that only around 6,500 Macs would have been affected.
"Of those, our presumption is that many were unable to run the infected file due to Apple quickly revoking the certificate used to sign the binary [the file], as well as updating the XProtect [Apple's anti-malware technology] definitions," said Clay, although he added that the company is still waiting for confirmation from Apple to back up this assumption.
07/03/2016: The days of Mac OS as a virus-free system are truly over, following the discovery of the first fully operational ransomware for Apple's operating system.
KeRanger, as the malicious program has been called, encrypts users' files and demands a ransom to unlock them, according to researchers from security firm Palo Alto Networks, who discovered the malware on Friday.
According to a blog post by researchers Claud Xiao and Jin Chen, version 2.90 of the Transmission BitTorrent client installer for OS X was infected with the ransomware just hours after being published.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
When opened, the compromised downloader (.dmg file) sits on the user's system for three days before contacting its command and control (C2) servers over the Tor network. It then encrypts the user's files and demands the equivalent of $200 (141) in Bitcoin to release those files.
The malware also attempted to encrypt Time Machine files, should a user have one connected, however this piece of the KeRanger code was apparently incomplete, so this part of the attack would not work.
Perhaps most worryingly, the ransomware application was signed with a valid Mac development certificate, meaning it could bypass OS X's Gatekeeper protection system.
The certificate has since been revoked by Apple after Palo Alto Networks notified it of the issue, so anyone attempting to open the compromised .dmg file now will be unable to do so.
However it is unclear how the valid certificate was obtained in the first place and Apple has declined to comment on the matter.
Transmission has also released an updated version of its client, which is free of KeRanger.
Additionally, it is unclear how the downloader became infected in the first place, although Xiao and Chen suggested Transmission's official website may have been compromised, allowing the attackers to replace the legitimate .dmgs with the malicious ones.
Greg Day, Palo Alto's EMEA CSO, told IT Pro the emergence of Mac ransomware was, in many ways, inevitable.
"The simple reality is that at home and in the workplace, more and more people are using Macs. With volume adoption, typically we see cybercrime follow the mainstream," Day said.
Day added that ramsomware has, over the past few years, become the most prevalent form of attack, as it offers greater ROI for cybercriminals and that KeRanger was a confluence of these two trends.
Independent security analyst Graham Cluley largely agreed, telling IT Pro that Mac ransomware had not, until now, been a priority for attackers.
"They've been doing 'very nicely, thank you' successfully extorting money out of Windows users, and it's easier to write a new ransomware variant for Windows (based upon the thousands of existing samples) than start from scratch for OS X," said Cluley.
"However, as Windows users become more savvy about ransomware, some criminals might regard Mac users as a softer target," he added.
As usual in these situations, those who have been compromised are recommended not to pay the ransom and to restore their OS from a secure backup, assuming they have one.
In order to protect themselves, users should also always ensure that their anti-virus is up to date, that their OS is patched, and that their computer is backed up.
(This article was first published on 07/03/16 and has since been updated to reflect new developments, most recently on 08/03/16)

Jane McCallion is Managing Editor of ITPro and ChannelPro, specializing in data centers, enterprise IT infrastructure, and cybersecurity. Before becoming Managing Editor, she held the role of Deputy Editor and, prior to that, Features Editor, managing a pool of freelance and internal writers, while continuing to specialize in enterprise IT infrastructure, and business strategy.
Prior to joining ITPro, Jane was a freelance business journalist writing as both Jane McCallion and Jane Bordenave for titles such as European CEO, World Finance, and Business Excellence Magazine.
-
Asus ZenScreen Fold OLED MQ17QH review
Reviews A stunning foldable 17.3in OLED display – but it's too expensive to be anything more than a thrilling tech demo
By Sasha Muller
-
How the UK MoJ achieved secure networks for prisons and offices with Palo Alto Networks
Case study Adopting zero trust is a necessity when your own users are trying to launch cyber attacks
By Rory Bathgate
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz