
On the same day, Apple CEO Tim Cook announced multiple new products at an online event. Ransomware group REvil claimed in a blog post published on Tuesday to have stolen blueprints for Apple’s latest products. How to secure your email via encryption, password management and more (TechRepublic Premium) Meet the most comprehensive portable cybersecurity device Suebsiri, Getty Images/iStockphoto Must-read security coverage Red binary computer code ransom screen background with stop symbol sign. Hackers claim to have infiltrated the networks of Quanta Computer Inc., which makes Macbooks and hardware for HP, Facebook and Google. "Keep at least two backup copies of all important data, and at least one should not be kept attached to your Mac at all times.Apple supplier Quanta hit with $50 million ransomware attack from REvil "The best way of avoiding the consequences of ransomware is to maintain a good set of backups," Reed concluded. While work is on to find a weakness in the encryption algorithm to create a decryptor, it's recommended that macOS users create backups to avoid data loss and use a utility like RansomWhere? to thwart such attacks. "Armed with these capabilities, the attacker can maintain full control over an infected host," Wardle said. In the last stage, EvilQuest launches a copy of itself and starts encrypting files - counting cryptocurrency wallet ("wallet.pdf") and keychain related files - before eventually displaying ransom instructions to pay $50 within 72 hours or risk leaving the files locked.īut EvilQuest's features go beyond typical ransomware, including the ability to communicate with a command-and-control server ("") to remotely execute commands, initiate keylogger, create a reverse shell, and even execute a malicious payload directly out of memory.

It also kills any security software (e.g., Kaspersky, Norton, Avast, DrWeb, McAfee, Bitdefender, and Bullguard) that may detect or block such malicious behavior on the system, and sets up persistence using launch agent and daemon property list files ("") to automatically restart the malware each time the user logs in.
