Remove KeRanger ransomware - Transmission 2.9 malware from Mac OS X
Remove KeRanger, the first known ransomware crafted for Mac OS X, learn how to avoid this assault and restore the files encrypted by this infection.
Obviously, the aforementioned vendor’s site had suffered a hack incident therefore the perpetrators were able to covertly substitute the original DMG file installer with an altered one carrying the harmful drive-by. The reason why the Gatekeeper solution failed to block these downloads is because the app featured a valid developer certificate, so the defenses simply didn’t identify the hazard on the initial stage. Thankfully, the cert has now been blacklisted, so Gatekeeper is flagging the corrupt setups.
Once the KeRanger ransomware ends up inside a Mac, it adds an executable disguised as ‘General.rtf’ file. When this object is automatically launched, it harvests machine-specific details and transmits these identifiers to the Command and Control server via Tor. Then, the virus scans the hard drive and encrypts files with widespread extensions, including documents, images, audio, video, certificates, emails, archives, and source code entities. Every ciphered item is appended with the .encrypted string at the end of the filename, so a ‘flower.jpg’ file will look like this – ‘flower.jpg.encrypted’. This part of the attack being completed, the victim will see data recovery instructions in a file named README_FOR_DECRYPT.txt.
According to the ransom notes, the infected Mac user needs to submit 1 BTC (about $400) in order to be able to download the decrypt pack. The document also contains the .onion address and the person’s unique ID for authentication with the malign service. The Tor website enables the victim to decrypt 1 file for free and provides the option to pay the ransom, send a ticket and read some FAQs. If the user chooses not to redeem their personal data with the deadline of 72 hours, the amount for buyout will most likely increase.
KeRanger leverages the RSA-2048 cryptographic algorithm to encode files. This is an asymmetric cipher, where the public key is used for encryption and the private key – for decryption. The latter high-entropy chunk of information stays on the extortionists’ remote server throughout the onslaught, so it’s not feasible to restore anything by brute-forcing or similar techniques. Doing the buyout, on the other hand, is a terrible idea. So what should the contaminated Mac users do? First and foremost, uninstall the KeRanger ransomware and try to use a couple of tips and tricks to reinstate the locked files.
KeRanger ransomware manual removal for Mac
The steps listed below will walk you through the removal of this application. Be sure to follow the instructions in the order specified.
• Open up the Utilities folder as shown below
• Locate the Activity Monitor icon on the screen and double-click on it
• Under Activity Monitor,find suspicious entries General.rtf, kernel_service, kernel_pid, kernel_time, kernel_complete), select them and click Quit Process for each.
• A dialog should pop up, asking if you are sure you would like to quit the executable. Select the Force Quit option
• Click the Go button again, but this time select Applications on the list. Find the Transmission entry on the interface, right-click on it and select Move to Trash. If user password is required, enter it. After the cleanup is performed all the way, you can reinstall the safe version of the app, that is, 2.92 and onward
• Now go to Apple Menu and pick the System Preferences option
• Select Accounts and click the Login Items button. Mac OS will come up with the list of the items that launch when the box is started up. Locate suspicious entries there and click on the "-" button for those
OSX.KeRanger virus automatic removal for Mac
1. Download and install MacBooster application (read review). The tool provides both optimization and security features for your Mac. Before you get down to obliterating KeRanger ransomware proper, consider checking your machine for other security risks and performance issues by hitting the Scan button.
2. Proceed to the Uninstaller feature, find OSX.KeRanger.A on the Applications list and have MacBooster completely eliminate all components of the app from your Mac by clicking Uninstall in the bottom part of the GUI. Doing so will ensure all components of the malware and its remainders, which may have not been removed in the manual way, will be thoroughly cleaned up.
Recover files encrypted by KeRanger ransomware
Since data decryption is not possible unless you pay the ransom, it’s recommended to restore files from an offline or cloud backup, or utilize a workaround. If there are backup copies on an external resource, be sure to uninstall KeRanger virus before downloading them otherwise the infection will encrypt those again. In case you don’t have backups, do the following:
• On the menu bar, click the Time Machine icon and select Enter Time Machineoption
• When the utility is running, open the directory that holds the files to be restored. Use the right-hand arrow toggles to go back to the point when the needed file or files were unaffected
• Highlight the file of interest and then click the Restore button down at the bottom
• The file should now be accessible. One important thing to remember is that KeRanger virus should be removed prior to recovery with Time Machine, because the ransomware will most likely encode the restored data again.