What You Need to Know About Mac Ransomware

Digital Fire • December 18, 2020

New strains of ransomware often affect many Windows computer systems but rarely affect Macintosh computers. There are some types of ransomware that specifically target Apple's machines. If your company mainly uses Macs, then defending against these threats is important. Here's what you should know about Mac ransomware.

What is Mac ransomware?

Ransomware is malware that locks up computers until a ransom is paid. It usually demands payment in gift cards or cryptocurrencies like Bitcoin or Ethereum. Phishing emails are used to distribute malware, but they can also be used to spread malware through unsecured network connections.

If Macs get infected by ransomware, users will not be able to use them because they're encrypted. Ransomware messages often threaten to release the information publicly or delete sensitive data if they aren't paid by a specified date. Health care and financial institutions, in particular, are most likely to pay the ransomware because they have a lot of valuable resources, such as money, and cannot afford to lose access to any of their critical information to ransomware threats.

Types of Mac ransomware

KeRanger ransomware was spread through the popular BitTorrent application Transmission. KeRanger was able to bypass Apple's built-in security mechanisms and install malware on thousands of Macs.

Another strain of Mac Ransomeware called Patcher was discovered in 2017. Ransomware disguised itself as an update for applications like Microsoft Word. When launched, Patched would encrypt files in user folders and require payment in Bitcoin. However, the ransomware was poorly written, so there was no easy method for recovering the encryption key once the ransom had been paid.

In 2019, the EvilQuest ransomware variant encrypted files and tried to trick users into paying a Bitcoin ransom. Like Patcher, however, PatchMe didn't provide any way for people who paid the ransomware to get their decrypted data back.

Ransomware outbreaks of malicious code like this one can occur at any time, so you need to be ready for them.

An ounce of prevention goes a long way

Preventative measures are the best ways to keep your Macs secure from ransomware and malicious software. You should update your software regularly to protect yourself from the latest security issues and install apps only from the official app store.

Ransomware initially spreads by sending malicious emails containing malware disguised as an attachment or link. Make sure to avoid these types of messages. Be vigilant even if it may appear to be from a reputable business or someone you know.

You must also maintain offline backups and have a disaster recovery plan to keep your business running in the off chance that ransomware successfully infiltrates your systems.

Responding to ransomware

If your Mac is affected by ransomware, don't pay the ransom fee, because there's no guarantee that they'll provide a decryption key for your files even if you pay them.

Instead, use an updated anti-virus program to remove ransomware from computers. If you're infected by ransomware, cybersecurity specialists might also release free decryption tools online. So be sure to check them out. If these programs and resources don't work, stop spreading the ransomware by disconnecting yourself from the network and running recovery procedures, if you've backed up your files in an external hard disk or the cloud.

Mac ransomware attacks aren't common, but they're still a big problem for your business. If you need any further help, please get in touch with us. We stay up to date on the latest Mac malware and how to protect your business from them.

Recent Posts

Split-screen illustration comparing IT and security infrastructure of a Law Firm vs. a Wealth Manage
By Leslie Babel March 19, 2026
How do IT costs differ between law firms and wealth management firms? Learn what drives pricing, compliance impact, and budgeting benchmarks.
Illustration of IT issues like data loss and security breaches causing employee stress and declining
By Leslie Babel March 17, 2026
Underfunding IT may reduce costs short term but increase risk long term. Learn the hidden operational, security, and insurance impacts most firms overlook.
Businessman balancing scales of blue IT security icons and green data analytics icons -Comparing MSP
By Leslie Babel March 12, 2026
Comparing MSP proposals? Learn how to evaluate pricing, security inclusion, service models, and risk exposure before choosing your next IT partner.
Man unlocking a gate to transition from a dark city (contract) to a bright, cloud-connected office.
By Leslie Babel March 10, 2026
Planning to switch IT providers? Learn how to exit an MSP contract safely, secure admin access, avoid disruption, and protect your business during transition.
Hands typing on a laptop with an
By Leslie Babel March 9, 2026
AI is here and your competitors are using it. Learn how to bring AI into your firm safely with small pilots, sandboxes, and clear guardrails.
Infographic showing signs to switch your MSP before a crisis, comparing reactive downtime to proactive IT benefits.
By Leslie Babel March 5, 2026
Frustrated with recurring IT issues or unclear security? Learn the 10 signs it may be time to switch your MSP before disruption or risk escalates.
Managed IT pricing banner showing icons for Scope, Complexity, Security, and Scale on a blue background.
By Leslie Babel March 3, 2026
Why does managed IT pricing vary so much? Learn the 6 factors that drive cost differences, including security, proactive support, and service model depth.
MSPs using AI internally for backend automation, leading to faster, secure client IT services.
By Leslie Babel February 27, 2026
How do MSPs use AI today? Learn how AI improves monitoring, security detection, root-cause analysis, and service consistency without replacing people.
Monitor displaying a scale weighing support requests against MSP performance and value with digital data overlays.
By Leslie Babel February 25, 2026
Ticket counts aren’t enough. Discover the KPIs that truly measure MSP performance, including incident trends, security outcomes, uptime, and repeat issues.
Cybersecurity insurance concept with a person reviewing a policy shield in a digital server room data center.
By Leslie Babel February 23, 2026
Preparing for cyber insurance renewal? Learn the 6 security controls insurers expect and how to avoid coverage delays, higher premiums, or denied claims.
Split-screen illustration comparing IT and security infrastructure of a Law Firm vs. a Wealth Manage
By Leslie Babel March 19, 2026
How do IT costs differ between law firms and wealth management firms? Learn what drives pricing, compliance impact, and budgeting benchmarks.
Illustration of IT issues like data loss and security breaches causing employee stress and declining
By Leslie Babel March 17, 2026
Underfunding IT may reduce costs short term but increase risk long term. Learn the hidden operational, security, and insurance impacts most firms overlook.
Businessman balancing scales of blue IT security icons and green data analytics icons -Comparing MSP
By Leslie Babel March 12, 2026
Comparing MSP proposals? Learn how to evaluate pricing, security inclusion, service models, and risk exposure before choosing your next IT partner.
Man unlocking a gate to transition from a dark city (contract) to a bright, cloud-connected office.
By Leslie Babel March 10, 2026
Planning to switch IT providers? Learn how to exit an MSP contract safely, secure admin access, avoid disruption, and protect your business during transition.
Hands typing on a laptop with an
By Leslie Babel March 9, 2026
AI is here and your competitors are using it. Learn how to bring AI into your firm safely with small pilots, sandboxes, and clear guardrails.
Infographic showing signs to switch your MSP before a crisis, comparing reactive downtime to proactive IT benefits.
By Leslie Babel March 5, 2026
Frustrated with recurring IT issues or unclear security? Learn the 10 signs it may be time to switch your MSP before disruption or risk escalates.
Managed IT pricing banner showing icons for Scope, Complexity, Security, and Scale on a blue background.
By Leslie Babel March 3, 2026
Why does managed IT pricing vary so much? Learn the 6 factors that drive cost differences, including security, proactive support, and service model depth.
MSPs using AI internally for backend automation, leading to faster, secure client IT services.
By Leslie Babel February 27, 2026
How do MSPs use AI today? Learn how AI improves monitoring, security detection, root-cause analysis, and service consistency without replacing people.
Monitor displaying a scale weighing support requests against MSP performance and value with digital data overlays.
By Leslie Babel February 25, 2026
Ticket counts aren’t enough. Discover the KPIs that truly measure MSP performance, including incident trends, security outcomes, uptime, and repeat issues.
Cybersecurity insurance concept with a person reviewing a policy shield in a digital server room data center.
By Leslie Babel February 23, 2026
Preparing for cyber insurance renewal? Learn the 6 security controls insurers expect and how to avoid coverage delays, higher premiums, or denied claims.