![apple ransomware apple ransomware](https://media.itpro.co.uk/image/upload/v1583408348/itpro/2020/03/Supercomputer.jpg)
![apple ransomware apple ransomware](https://media.itpro.co.uk/image/upload/v1570815675/itpro/2017/05/4g_lte_mobile_0.jpg)
The actual transaction information remains unknown as Apple and/or Quanta computers have not released it yet. In the case of the Apple ransomware attack, even though Apple was the primary target, the hackers victimized Apple's distributor Quanta computers to ensure their efforts are successful. One of which is targeting a not-so-household name supplier or a vendor who has a prominent client base. There are multiple strategies that hackers adopt to shortlist their targets. So, even if the victims have a backup of their files, they run the risk of having confidential information shared on the internet if the ransom is unpaid.įor the past couple of years, extortion in the name of a ransomware attack is becoming a norm. They do this to acquire additional leverage and ensure payment.
![apple ransomware apple ransomware](https://media.itpro.co.uk/image/upload/v1599588695/itpro/HPE_MSA_Gen_6.jpg)
Now, the hackers steal the files before encrypting them and threaten the victims to leak confidential information if the ransom is not paid in time. In 2021, the landscape of ransomware attacks has changed. How Was the Attack on Apple Different From the Usual Ransomware Attack?įor decades, ransomware attacks were a simple transaction of encrypting a victim's files, asking for the money, once paid, giving victims their decryption key. The hackers confirmed stealing data and schematics and threatened that they would sell the data to the highest bidder if they didn't get a $50 million payment.
![apple ransomware apple ransomware](https://www.iclarified.com/images/news/14655/14655/14655-640.jpg)
They've since added iMac schematics to the pile. As proof, they released confidential documents about upcoming, unreleased MacBook Pros. The data was stolen not from Apple but their distributor - Quanta computers. Right before their big spring product launch, a group of hackers claimed to have stolen their product blueprints for $50 Million in the ransom demand. To back up their assertions, they have posted a set of blueprints for some products, including schematics for the new iMacs that the company launched on Tuesday.Attack on Apple Is The Future Of Ransomware The hackers claim that among the stolen documents are plans for a pair of Apple laptops, a new Apple Watch and a new Lenovo ThinkPad. From our side, a lot of time has been devoted to solving this problem.” “In order not to wait for the upcoming Apple presentations, today we, the REvil group, will provide data on the upcoming releases of the company so beloved by many,” the blog says. But Sodin has gone one step further, attempting to steal the files themselves and extort payment from those who have backups by threatening to publish confidential data.Īccording to a statement posted on the criminals’ dark web site – which they call the “Happy Blog” – Quanta refused to pay the ransom, leading the hackers to begin threatening the company’s customers. Like normal ransomware, REvil encrypts victims’ files and demands payment to receive the encryption key and recover the data.