Welcome, Guest | Home | Search | Login | Register
Author PPC Ransomware (Read 13321 times)
wove
1024 MB
******
Posts: 1363

View Profile
on: April 16, 2023, 22:56

I was reading today that security researchers found that LockBit ransomware gang which generally targets Windows and Linux, had released a package targeting the M1 Mac. It makes sense that Macs should not remain immune to ransomware attacks.

What is odd though was that the researchers also found that LockBit had released a package for PowerPC Macs. It did not say if it was for the Classic Mac OS or OS X, but I imagine it was for OS X. I find that very strange. I run OS X on G4/G5 hardware, but I do not have anything on the systems I would pay a ransom to get back.  I have some pictures, lots of notes and text. It is stuff I think of as private, but its destruction or release is not something that would result in any material harm to me.

Would you pay a ransom to get back material or prevent the release of material you have have stored on your PPC hardware?

Bolkonskij
Administrator
1024 MB
*****
Posts: 2023
View Profile Cornica - Video Entertainment for Mac OS users
Reply #1 on: April 17, 2023, 09:40

Short answer: No.

Just like you. Just like most private people. I'd just format the thing and apply a backup.

I think ransonware mainly targets businesses by putting pressure on the exec level (the equation being: what's more disastrous financially for us? not being able to use our IT or to pay the money?)

So I don't really get the PPC OSX target, if it's even true.

But hey, it's a pretty good life over on the System 7 side ;-)
wove
1024 MB
******
Posts: 1363

View Profile
Reply #2 on: April 17, 2023, 16:33

I did a bit more reading on this. For the most part how this all works is well above my pay grade. LockBit operates like a traditional software company, which is why it has been so successful. You can get a "license" for a price that depends on what you want to do with it. It started with the big lucrative targets, but has moved more into just general mayhem. So now you can get a package to say just mess around with someone you have a grudge against.

They have packages that target specific OSes, and they also have packages that target specific architectures. It is up to the individual deploying these packages to configure the package and provide the wrapper to hold the package. Since most machines using ARM SPARC, or PPC are built on hardware reference platforms the actual ransomware package if properly configured should be able to do its deed.

So while it would be necessary to configure the package for System 7.6.1 and make a wrapper to contain it and be desirable enough for the target to want to install it, the ransomware package itself should do its magic on a PM8600 running 7.6.1.

Pages: [1]

© 2021 System7Today.com.
The Apple Logo, Macintosh™, Mac OS™, and others property of Apple Computer, Inc.
This site is in no way affiliated with Apple Computer, Inc.