What You Need to Know About Mac Ransomware

Digital Fire • December 18, 2020

New strains of ransomware often affect many Windows computer systems but rarely affect Macintosh computers. There are some types of ransomware that specifically target Apple's machines. If your company mainly uses Macs, then defending against these threats is important. Here's what you should know about Mac ransomware.

What is Mac ransomware?

Ransomware is malware that locks up computers until a ransom is paid. It usually demands payment in gift cards or cryptocurrencies like Bitcoin or Ethereum. Phishing emails are used to distribute malware, but they can also be used to spread malware through unsecured network connections.

If Macs get infected by ransomware, users will not be able to use them because they're encrypted. Ransomware messages often threaten to release the information publicly or delete sensitive data if they aren't paid by a specified date. Health care and financial institutions, in particular, are most likely to pay the ransomware because they have a lot of valuable resources, such as money, and cannot afford to lose access to any of their critical information to ransomware threats.

Types of Mac ransomware

KeRanger ransomware was spread through the popular BitTorrent application Transmission. KeRanger was able to bypass Apple's built-in security mechanisms and install malware on thousands of Macs.

Another strain of Mac Ransomeware called Patcher was discovered in 2017. Ransomware disguised itself as an update for applications like Microsoft Word. When launched, Patched would encrypt files in user folders and require payment in Bitcoin. However, the ransomware was poorly written, so there was no easy method for recovering the encryption key once the ransom had been paid.

In 2019, the EvilQuest ransomware variant encrypted files and tried to trick users into paying a Bitcoin ransom. Like Patcher, however, PatchMe didn't provide any way for people who paid the ransomware to get their decrypted data back.

Ransomware outbreaks of malicious code like this one can occur at any time, so you need to be ready for them.

An ounce of prevention goes a long way

Preventative measures are the best ways to keep your Macs secure from ransomware and malicious software. You should update your software regularly to protect yourself from the latest security issues and install apps only from the official app store.

Ransomware initially spreads by sending malicious emails containing malware disguised as an attachment or link. Make sure to avoid these types of messages. Be vigilant even if it may appear to be from a reputable business or someone you know.

You must also maintain offline backups and have a disaster recovery plan to keep your business running in the off chance that ransomware successfully infiltrates your systems.

Responding to ransomware

If your Mac is affected by ransomware, don't pay the ransom fee, because there's no guarantee that they'll provide a decryption key for your files even if you pay them.

Instead, use an updated anti-virus program to remove ransomware from computers. If you're infected by ransomware, cybersecurity specialists might also release free decryption tools online. So be sure to check them out. If these programs and resources don't work, stop spreading the ransomware by disconnecting yourself from the network and running recovery procedures, if you've backed up your files in an external hard disk or the cloud.

Mac ransomware attacks aren't common, but they're still a big problem for your business. If you need any further help, please get in touch with us. We stay up to date on the latest Mac malware and how to protect your business from them.

Recent Posts

Digital magnifying glass over a scale balancing a security shield and a person, representing MSP.
By Leslie Babel February 18, 2026
Not a technical expert? Learn how to evaluate MSP security claims using simple questions about frameworks, included controls, monitoring, and accountability.
Conceptual illustration of IT icons like cloud, security shields, and servers connected by data line
By Leslie Babel February 16, 2026
What does fully managed IT actually include? See what’s covered by default, what’s usually extra, and how to compare MSP proposals without surprises.
Seesaw with server racks on one side, gears, and
By Leslie Babel February 13, 2026
Why does standardizing your IT stack reduce downtime and security risk? Learn how consistency improves reliability, speeds resolution, and prevents repeat issues.
CIS Controls
By Leslie Babel February 11, 2026
Which CIS controls should small professional services firms implement first? Start with the 8 highest-impact safeguards to reduce cyber risk and improve resilience.
Stressed worker in red
By Leslie Babel February 9, 2026
Reactive vs proactive IT: what’s the real difference? Learn how proactive support reduces downtime, recurring issues, security risk, and long-term IT costs.
Three IT service tiers featuring icons for data servers, security shields, and cloud computing solutions.
By Leslie Babel February 6, 2026
How much does managed IT cost in Oakville? Most 25–75 user firms pay $175–$275 per user. See what’s included, what’s extra, and what affects pricing.
Cybersecurity icons, featuring a glowing green shield and various protected mobile devices.
By Leslie Babel February 4, 2026
Discover the 8 essential security services every professional services firm should expect from an MSP, including MFA, EDR, backups, monitoring, and framework alignment.
A business team sitting around a conference table with a large, metallic silver question mark.
By Leslie Babel February 3, 2026
Before hiring an MSP, ask these 7 essential questions about proactive support, security controls, pricing transparency, onboarding, and long-term IT stability.
Two people analyzing charts and graphs on a cluttered wooden desk, possibly for business or finance.
By Leslie Babel August 25, 2025
Discover how service business owners can grow by dedicating 11% of their time to innovation, technology, and community-building. Tips from Digital Fire’s latest webinar.
A man in a suit is standing on top of a city at night.
By Leslie Babel June 17, 2025
Discover 10 powerful business technologies that can reduce downtime, secure your systems, and fuel growth.
Digital magnifying glass over a scale balancing a security shield and a person, representing MSP.
By Leslie Babel February 18, 2026
Not a technical expert? Learn how to evaluate MSP security claims using simple questions about frameworks, included controls, monitoring, and accountability.
Conceptual illustration of IT icons like cloud, security shields, and servers connected by data line
By Leslie Babel February 16, 2026
What does fully managed IT actually include? See what’s covered by default, what’s usually extra, and how to compare MSP proposals without surprises.
Seesaw with server racks on one side, gears, and
By Leslie Babel February 13, 2026
Why does standardizing your IT stack reduce downtime and security risk? Learn how consistency improves reliability, speeds resolution, and prevents repeat issues.
CIS Controls
By Leslie Babel February 11, 2026
Which CIS controls should small professional services firms implement first? Start with the 8 highest-impact safeguards to reduce cyber risk and improve resilience.
Stressed worker in red
By Leslie Babel February 9, 2026
Reactive vs proactive IT: what’s the real difference? Learn how proactive support reduces downtime, recurring issues, security risk, and long-term IT costs.
Three IT service tiers featuring icons for data servers, security shields, and cloud computing solutions.
By Leslie Babel February 6, 2026
How much does managed IT cost in Oakville? Most 25–75 user firms pay $175–$275 per user. See what’s included, what’s extra, and what affects pricing.
Cybersecurity icons, featuring a glowing green shield and various protected mobile devices.
By Leslie Babel February 4, 2026
Discover the 8 essential security services every professional services firm should expect from an MSP, including MFA, EDR, backups, monitoring, and framework alignment.
A business team sitting around a conference table with a large, metallic silver question mark.
By Leslie Babel February 3, 2026
Before hiring an MSP, ask these 7 essential questions about proactive support, security controls, pricing transparency, onboarding, and long-term IT stability.
Two people analyzing charts and graphs on a cluttered wooden desk, possibly for business or finance.
By Leslie Babel August 25, 2025
Discover how service business owners can grow by dedicating 11% of their time to innovation, technology, and community-building. Tips from Digital Fire’s latest webinar.
A man in a suit is standing on top of a city at night.
By Leslie Babel June 17, 2025
Discover 10 powerful business technologies that can reduce downtime, secure your systems, and fuel growth.