The “Air” line of MacBooks keep all the convenience and quality-of-life upgrades that have landed in the more expensive MacBooks, like 4 million pixel retina displays and fingerprint Touch ID access, but it’s all crammed into a smaller, lighter model. The MacBook Air is 2.8 lbs, compared to the MacBook Pro’s 3.02 lbs. With 8GB of RAM and 256GB of storage, the Air might not let you run Adobe After Effects with the lightning quickness you want, but you’ll be able to indulge in basic photo manipulation and most other consumer-level computer work with ease.
For more computer literate people, this comes with SSD storage, with all the extra speed and reliability that entails. There’s also a backlit keyboard, a 10th-generation Intel Core i3 processor, and two Thunderbolt 3 (USB-C) ports, as well as a new battery that can last up to 11 hours (according to marketing materials).
Basically, this is a fully functioning computer shoved into a case with the size and portability of a Chromebook, which is sort of incredible on its own. We’re not sure how long this deal will last; all we know is there’s never been a better one. (Okay, fine, we know it was once $899, instead of $899.99, but we’re not sure that two-thirds the price of a pack of Jolly Ranchers is a deal-breaker when you’re buying a laptop).
Hearst Newspapers participates in various affiliate marketing programs, which means we may get paid commissions on editorially chosen products purchased through our links to retailer sites.
Joshua Sargent is an editor for Hearst Newspapers. Email him at josh.sargent@hearst.com.
Security researchers have discovered this week a new ransomware strain targeting macOS users.
Named OSX.EvilQuest, this ransomware is different from previous macOS ransomware threats because besides encrypting the victim’s files, EvilQuest also installs a keylogger, a reverse shell, and steals cryptocurrency wallet-related files from infected hosts.
“Armed with these capabilities, the attacker can main full control over an infected host,” said Patrick Wardle, Principal Security Researcher at Jamf. This means that even if victims paid, the attacker would still have access to their computer and continue to steal files and keyboard strokes.
Wardle is currently one of the many macOS security researchers who are analyzing this new threat.
Others who are also investigating EvilQuest include Thomas Reed, Director of Mac & Mobile at Malwarebytes, and Phil Stokes, macOS security researcher at SentinelOne.
Reed and Stokes are currently looking for a weakness or bug in the ransomware’s encryption scheme that could be exploited to create a decryptor and help infected victims recover their files without paying the ransom.
EvilQuest is distributed via pirated software
But the researcher who first spotted the new EvilQuest ransomware is K7 Lab security researcher Dinesh Devadoss.
Devadoss tweeted about his finding yesterday, June 29. However, new evidence surfaced in the meantime has revealed that EvilQuest has been, in reality, distributed in the wild since the start of June 2020.
Reed told ZDNet in a phone call today that Malwarebytes has found EvilQuest hidden inside pirated macOS software uploaded on torrent portals and online forums.
Devadoos has spotted EvilQuest hidden in a software package called Google Software Update, Wardle has found samples of EvilQuest inside a pirated version of popular DJ software Mixed In Key, and Reed has spotted it hidden inside the macOS security tool called Little Snitch.
Russian forum spreading pirated macOS app infected with OSX.EvilQuest
Image: ZDNet via Malwarebytes
However, Reed told us he believes the ransomware is most likely more broadly distributed, leveraging many more other apps, and not just these three.
Wardle, who published an in-depth technical analysis of EvilQuest earlier today, said the malware is pretty straightforward, as it moves to encrypt the user’s files as soon as it’s executed.
Once the file encryption scheme ends, a popup is shown to the user, letting the victim know they’ve been infected and their files encrypted.
Image: Dinesh Devadoss
The victim is directed to open a ransom note in the form of a text file that has been placed on their desktop, which looks like the one below:
Image: Patrick Wardle
Stokes told ZDNet the ransomware will encrypt any files with the following file extensions:
After the encryption process ends, the ransomware installs a keylogger to record all the user’s keystrokes, a reverse shell so the attacker can connect to the infected host and run custom commands, and will also look to steal the following types of files, usually employed by cryptocurrency wallet applications.
“wallet.pdf”
“wallet.png”
“key.png”
“*.p12”
In his own analysis of EvilQuest, Reed also noted that the ransomware also attempts to modify files specific to Google Chrome’s update mechanism, and use the files as a form of persistence on infected hosts.
“These [Chrome update] files had the content of the patch file prepended to them, which of course would mean that the malicious code would run when any of these files is executed,” Reed said. “However, Chrome will see that the files have been modified, and will replace the modified files with clean copies as soon as it runs, so it’s unclear what the purpose here is.”
Wardle, who has created several open-source macOS security tools, said that a tool he released in 2016, named RansomWhere, can detect and stop EvilQuest from running. Reed also said that Malwarebytes for Mac was also updated to detect and stop this ransomware before it does any damage.
EvilQuest is the third ransomware strain that has exclusively targeted macOS users after KeRanger and Patcher. Another macOS ransomware strain called Mabouia only existed at a theoretical level and was never released in the real world.