IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

MacBook users warned against EvilQuest ransomware

The malware aims to encrypt macOS devices, which are typically less affected by ransomware

Red skull and crossbones atop binary code

Security researchers have warned they’ve spotted a new ransomware variant that targets macOS devices in the wild.

According to Varonis’s February 2021 Malware Trends Report, EvilQuest, also known as ThiefQuest and Mac.Ransom.K, is ransomware that aims to encrypt macOS devices, which are typically less affected by this type of threat.

Ben Zion Lavi, a researcher at Varonis, said another unusual detail about EvilQuest that stands out compared to other ransomware variants is it uses symmetric encryption all the way, as opposed to using an asymmetric key in at least one stage of the encryption.

“This means that the key that was used to encrypt the file can be used to decrypt it, thus making the challenge of decrypting the files a lot easier,” Lavi said.

According to researchers, the ransomware includes data exfiltration functionality that uses three external Python scripts to send out HTTP post requests. It also includes additional functionality that many ransomware variants don’t normally have. 

“For example, it looks for SSH keys that might allow the attacker to interactively logon into a victim’s device. It also looks for trusted certificates, which can allow the attacker to access sites without causing security warnings,” said Lavi.

Researchers also found evidence of key-logging functionality in parts of the code. These code segments call API functions aimed at finding low-level hardware events.

“We can find evidence that the ransomware is still being developed and is not yet in its final form. The decryption functionality, for example, is not completely implemented. Because the decryption routine is not called anywhere inside the code, victims will surely not be able to decrypt their files, even if they pay the ransom,” said Lavi.

Researchers also warned that an Iranian hacking group named “Foudre” had recently resurfaced. The group dates back to as early as 2007 and exfiltrated data from organizations and VIPs. 

“The APT, which was mostly but not exclusively used against targets in Europe and North America, consists of several stages. The first stage includes the victim opening a crafted document that contains macro code, which self-extracts archives with “Foudre” components,” said Lavi.

Lavi added that the malware the hackers used leverages domain generating algorithms (DGA), a technique that generates and tries to communicate with many domain names, but only one of them is the real C2 server domain name. This allows the attacker to hide their identity and maintain the C2 server’s clean reputation longer. 

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT
ransomware

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

13 Apr 2022
Apple 24in iMac (Apple M1, 2021) review: Apple’s iconic desktop all-in-one, reborn
Hardware

Apple 24in iMac (Apple M1, 2021) review: Apple’s iconic desktop all-in-one, reborn

16 Feb 2022
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
RATDispenser evades nine in ten anti-virus engines
Security

RATDispenser evades nine in ten anti-virus engines

24 Nov 2021

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
Microsoft to double salary budget to retain workers
Careers & training

Microsoft to double salary budget to retain workers

17 May 2022