Humm. . . Who is capable and benefits from such an attack on Apple? I’m just paranoid I guess.
According to the article, the “ransomware” is installed by downloading a BitTorrent application. I’m pretty sure you’d have to enter your password to approve installation of this application (not going to test it). BitTorrents are also typically used to send files, like pirated movies, that probably should be avoided in the first place.