All posts by Adam Thompson

MacRansom: First Ever Ransomware-as-a-Service Attack Strikes macOS

4 votes, average: 3.00 out of 54 votes, average: 3.00 out of 54 votes, average: 3.00 out of 54 votes, average: 3.00 out of 54 votes, average: 3.00 out of 5 (4 votes, average: 3.00 out of 5, rated)
Loading...

The first instance of ransomware-as-a-service has been discovered on the Dark Web

Many macOS users thought they were safe from the fury of the ransomware attacks – after all, Apple enjoys a great reputation for security – but security researchers have found traces of ransomware provided through a ransomware-as-a-service (RAAS) portal.

As far as Windows systems are concerned, these ransomware-as-a-service attacks (RAAS) have been around for quite a while now. This is purely down to the fact that Windows is the most widely adopted OS globally. Granted, macOS offers a more secure platform compared to Windows OS, but contrary to popular belief, that doesn’t mean that the Apple systems are safe from threats. No system in the world is 100% secure and macOS is no different.

However, this is believed to be the first case of macOS being targeted via service portals on the Dark Web. The ransomware-as-a-service portal allows wannabe cyber criminals with limited or zero coding skills to attack systems and earn a quick buck. From far, it appears to be a highly lucrative option. Therefore, it wouldn’t even be surprising to see high school kids having a go at it. All these budding miscreants have to do is contact the author on the Dark Web, retrieve the malicious code and spread it via spam emails.

Once the files are encrypted, com.apple.finder.plist and the original executable are encrypted by MacRansom. Recovery tools prove to be useless as it alters the Time Date Stamp.

The victim is given 7 days to pay the ransom. They must pay 0.25 bitcoins (around $700) in one week or else the encrypted files will be destroyed. To get the files decrypted, MacRansom requires the victim to contact on an email ID. On receiving payment from the victim, the perpetrator must pay 70% of the money to the author and he/she gets to keep 30% as the profit.

Initially, this was considered to be a big, loudmouthed scam by the research team of security firm Fortinet. The “customers” had to contact the developer instead of downloading the malicious files directly. To get it uncovered, the Fortinet research team tried contacting the author by pretending to be a middle-man and astonishingly, they got a reply from the developer. They found the MacRansom on the web portal of TOR. It proclaims itself as the ‘the most sophisticated Mac ransomware ever.

Sophisticated? Not so much.

The MacRansom can encrypt only 128 files in one go using a symmetric encryption technique. This puts a significant restraint on its impact as well as on its magnitude. The researchers at Fortinet have described the attack to be far inferior compared to the prevalent ransomware attacks on Windows OS. However, ignorance is certainly not an option as it is still capable of encrypting valuable information.

It is not the only “service” posing a threat to the Apple users, either. MacSpy, a malware-as-a-service (MAAS) attack, is a piece of trojan spyware targeted at Mac users. MacSpy can be found by following the same process. The same developer is believed to be behind MacSpy.

The RAT free variant is used to keep tabs on the targeted computers. The cyber attackers record the activities of the user by employing tactics such as keylogging, voice recording, intercepting the data transferred to cloud storage and capturing screenshots periodically.

It is reported that a paid version of MacSpy is also there. However, it is still unclear how many bitcoins it costs. This version is said to cause a substantial amount of damage compared to the free variant. MacSpy is supposed to be in beta test mode and therefore, it is not widespread at this point.

Explaining the reason behind these so called “services,” the authors give credit to the rising numbers of users adopting Mac. Stating the reason for creating MacSpy as a service, they cite that there was an absence of “sophisticated malware for Mac users”.

At this point, these attacks don’t represent much in terms of their scale and severity but they might be the harbinger of the things to come.

Fundamental Differences between Symmetric and Asymmetric Encryption

9 votes, average: 4.22 out of 59 votes, average: 4.22 out of 59 votes, average: 4.22 out of 59 votes, average: 4.22 out of 59 votes, average: 4.22 out of 5 (9 votes, average: 4.22 out of 5, rated)
Loading...

RapidSSLonline brings you the technical comparative breakdown of the two encryption methods

Day after day, the tally of data breaches and data-tampering incidents keeps reaching new heights. This is because cyberattackers keep evolving by finding new, delicate techniques to victimize online users. In order to counteract such attempts, safeguarding information has become an indispensable measure in today’s cybersecurity world. Encryption is one such method to protect discreet information being transferred online. The Encryption technique is employed in two ways, namely Symmetric Encryption and Asymmetric Encryption.

Read More Fundamental Differences between Symmetric and Asymmetric Encryption

How to Enable HTTPS on a WordPress Multisite Network

10 votes, average: 2.70 out of 510 votes, average: 2.70 out of 510 votes, average: 2.70 out of 510 votes, average: 2.70 out of 510 votes, average: 2.70 out of 5 (10 votes, average: 2.70 out of 5, rated)
Loading...

Extend the benefits of SSL to multiple WordPress sites

‘HTTPS’ is an internet protocol just like HTTP. The world of the internet is moving from HTTP to HTTPS—the S stands secure. That means that a secured connection is established between an online user’s browser and the web server hosting the website. This secure connection is facilitated through an SSL certificate.

Read More How to Enable HTTPS on a WordPress Multisite Network

10 Simple Steps to Install SSL Certificate on FileZilla Server

5 votes, average: 2.60 out of 55 votes, average: 2.60 out of 55 votes, average: 2.60 out of 55 votes, average: 2.60 out of 55 votes, average: 2.60 out of 5 (5 votes, average: 2.60 out of 5, rated)
Loading...

SSL installation process on FileZilla server simplified

FileZilla server is an open-source product under the umbrella of FileZilla, an open-source FTP platform. FileZilla server is a sister product of FileZilla client. The source code of FileZilla is hosted by SourceForge, an online platform for monitoring and managing open-source software projects. FileZilla SFTP server supports FTP and FTP over TLS/SSL.

Read More 10 Simple Steps to Install SSL Certificate on FileZilla Server

9 WordPress Website Security Tips from WordPress Security Experts

3 votes, average: 3.67 out of 53 votes, average: 3.67 out of 53 votes, average: 3.67 out of 53 votes, average: 3.67 out of 53 votes, average: 3.67 out of 5 (3 votes, average: 3.67 out of 5, rated)
Loading...

The best practices for formidable WordPress website security

Launched in 2003, WordPress has become the largest content management system (CMS) in the world. Statistics show that almost 30% of the internet is driven by WordPress. Therefore, its popularity alone is enough to grab the attention of cyber attackers. As you already know, WordPress is an open source script, thereby an easy target for online perpetrators. Keeping these things in mind, it is vital not to take WordPress website security lightly.

Read More 9 WordPress Website Security Tips from WordPress Security Experts

Install SSL Certificate on Novell Console One Server

2 votes, average: 3.00 out of 52 votes, average: 3.00 out of 52 votes, average: 3.00 out of 52 votes, average: 3.00 out of 52 votes, average: 3.00 out of 5 (2 votes, average: 3.00 out of 5, rated)
Loading...

A step-by-step guide for SSL Certificate Installation for Novell Console One Server

If you want to install the certificate on Novell Console One server, then you have come to the right place. Follow the instructions given in the document below and you will be fine. In case of any errors or failures to implement any of the instructions given below, we suggest you contact the vendor or the Novell supporting organization.

Read More Install SSL Certificate on Novell Console One Server

How to Install an SSL Certificate on the Oracle Wallet Manager

4 votes, average: 4.00 out of 54 votes, average: 4.00 out of 54 votes, average: 4.00 out of 54 votes, average: 4.00 out of 54 votes, average: 4.00 out of 5 (4 votes, average: 4.00 out of 5, rated)
Loading...

Follow these instructions for installing the SSL certificate on Oracle Wallet Manager.

Want to install the certificate on Oracle Wallet Manager? Well, this post is for you. Here you can find the step-by-step process of installing the certificate on the Oracle Wallet Manager. In case of any hitches during the installation, SSL suggests you contact Oracle for the issue.

Read More How to Install an SSL Certificate on the Oracle Wallet Manager

Installing an SSL Certificate on SAP Web Dispatcher

2 votes, average: 3.00 out of 52 votes, average: 3.00 out of 52 votes, average: 3.00 out of 52 votes, average: 3.00 out of 52 votes, average: 3.00 out of 5 (2 votes, average: 3.00 out of 5, rated)
Loading...

A step-by-step guide on how to install an SSL certificate on SAP Web Dispatcher

You already needed SSL, let’s just start with that. SSL is an integral part of any good cyber security implementation. It shouldn’t take the browser community more or less mandating SSL for most site owners to realize they need to encrypt their communication in order to protect their website and its users. But, this isn’t a perfect world and for a lot of site it wasn’t until Google labeled them “Not Secure” that SSL even entered the conversation.

Read More Installing an SSL Certificate on SAP Web Dispatcher

Installing an SSL Certificate on Plesk 12 Servers

3 votes, average: 2.33 out of 53 votes, average: 2.33 out of 53 votes, average: 2.33 out of 53 votes, average: 2.33 out of 53 votes, average: 2.33 out of 5 (3 votes, average: 2.33 out of 5, rated)
Loading...

A step-by-step guide on how to install an SSL certificate on Plesk 12 servers

It’s 2017 and that means that the browsers have finished incentivizing SSL and are starting to actively penalize sites that still haven’t added it. It’s already happening. Websites with login screens that are served over unsecure HTTP are being flagged as “Not Secure.” Soon the warning will expand to all pages without SSL.

Read More Installing an SSL Certificate on Plesk 12 Servers