
That one demanded a $300 ransom paid in the form of mechanisms such as Paysafecard or uKash.
#Apple ransomware 2017 android
The campaign in many respects resembles one that hit Android users in 2014. Petya hit some large firms, and like the earlier WannaCry ransomware. iOS users who are hit by the scam can clear their browsing cache by going into settings > Safari > Clear History and Website Data. Petya is another Ransomware attack, similar to WannaCry, that struck computers in Europe and the US at the end of June 2017. The attackers, the Lookout researchers said, purchased a large number of domains in an attempt to "catch users that are seeking controversial content on the internet and coerce them into paying a ransom to them." Sites tailored the messages they delivered based on country identifiers. The JavaScript used in the attack shows signs of being used to exploit the same Safari flaw present in iOS version 8, which was released in 2014. The bad news is that hackers have somehow managed to get their hands-on login credentials for some users. The good news is that the situation does not appear to be an Apple hack. The nature of the attacks led some users to wonder if Apple itself had suffered some kind of hack.
#Apple ransomware 2017 mac
The user provided the screenshot shown above, which attempts to instill fear with the claim the device was being locked "for illegal pornography." Below those words was a pop-up Window that said "Cannot Open Page." Each time the person clicked on the accompanying OK button, a new window would open again. A recent rash of ransomware attacks has left some Apple users locked out of their Mac computers and iOS devices. "The attackers effectively used fear as a factor to get what they wanted before the victim realized that there was little actual risk," Lookout researchers Andrew Blaich and Jeremy Richards wrote in Monday's post.īlaich and Richards said they first learned of the attacks when someone using iOS version 10.2 reported losing control of Safari after visiting the website pay-policecom. This simple fix was possibly lost on some uninformed targets who were too uncomfortable to ask for outside help. In fact, recovering from the pop-up loop was as easy as going into the device settings and clearing the browser cache.
#Apple ransomware 2017 code
The attacker websites posed as law-enforcement actions and falsely claimed that the only way users could regain use of their browser was to pay a fine in the form of an iTunes gift card code to be delivered by text message. In a blog post published Monday afternoon, researchers from mobile-security provider Lookout described how exploit code surreptitiously planted on multiple websites caused an endless loop of windows to be displayed in a way that prevented the browser from being used.

The flaw involved the way that Safari displayed JavaScript pop-up windows.

Apple patched the vulnerability on Monday with the release of iOS version 10.3.

The scammers particularly target those who viewed porn or other controversial content. Ransomware scammers have been exploiting a flaw in Apple's Mobile Safari browser in a campaign to extort fees from uninformed users.
