India

Govt Warns Apple Laptop Users In India About ‘ThiefQuest’; Know The Details

New Delhi: The Indian Computer Emergency Response Team (CERT-In) has issued an advisory alerting Apple MacBook, iMac and other macOS users about a new ransomware called ThiefQuest, which has been spreading since last month.

This new ransomware, also called EvilQuest, locks files on macOS and spies on infected systems. CERT-In has also listed steps for users to protect themselves.

Here are the details about the new MacOS ransomware and how you can stay safe:

a) The ThiefQuest ransomware not only encrypts the files on the system but also installs a keylogger, remote shell and steals cryptocurrency wallet-related files from infected hosts, according to a Gadgetsnow report.

b) This ransomware continues to track victims, even after they have paid ransom, to unlock their system as the attacker continues to have access to the computer and can exfiltrate files and keystrokes. This ransomware is distributed via legitimate applications on Torrent websites such as Little Snitch, Ableton, and Mixed in Key.

c) ThiefQuest runs the Python scripts by downloading them as disguised GIFs. If a file matches the search criteria, it will base 64 encode the file contents and send it to C&C server. These files include text files, images, Word documents, SSL certificates, code-signing certificates, source code, projects, backups, spreadsheets, presentations, databases, and cryptocurrency wallets.

d) The attackers do not provide any email address to contact them for decryption after the ransom has been paid. “This makes it impossible for attackers to identify victims who have paid ransom. This leads to the suspicion that ransomware may be used for spying and other malicious activity,” CERT-In was quoted as saying.

e) Ransomware generally targets common file types. Regular backups of all critical information should be kept on a separate device, and backups should be stored offline. Remote access, when not in use, must be disabled.

f) Execution of Power shell /WSCRIPT in an enterprise environment should be restricted and a Sender Policy Framework (SPF) for your domain should be established. Block binaries running from %APPDATA% and %TEMP% paths by whitelisting applications or implementing Software Restriction Policies (SRP) strictly.

g) Segmenting the network and segregating it into security zones will help protect sensitive information and critical services. Ad blockers should be installed.

OB Bureau

Recent Posts

Rashmika Mandanna Spotted In A Wheelchair, Struggles To Stand On Her Feet [Watch]

New Delhi: After the record-breaking success of ‘Pushpa 2: The Rule’, Rashmika Mandanna has her…

2 hours ago

12 VWSC Members From Odisha Invited To Attend Republic Day Celebrations In Delhi

Bhubaneswar: Twelve members of Village Water and Sanitation Committees (VWSC) from nine districts of Odisha…

2 hours ago

This Is How Janhvi Kapoor Plans To Settle Down After Marriage [Watch]

Hyderabad: Bollywood actress Janhvi Kapoor, who is rumoured to be dating Shikhar Pahariya, had once…

2 hours ago

Industrial Projects Worth Rs 3,883 Cr Approved Ahead of Utkarsh Odisha Conclave

Bhubaneswar: In a remarkable stride toward strengthening industrial ecosystem, the Odisha government on Wednesday approved…

2 hours ago

ISL: Odisha FC Rally From 2-Goal Deficit To Snatch Thrilling Victory Vs Bengaluru FC, Diego Mauricio Nets Brace

Bengaluru: Playing away from home, Odisha FC turned the game on its head to snatch a…

3 hours ago

Balakrishna-Urvashi Starrer ‘Daaku Maharaaj’ To Be Released In Hindi

Hyderabad: Two weeks after its Telugu release, the Hindi version of Balakrishna-Urvashi Rautela starrer ‘Daaku…

3 hours ago