Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Malware/trojan?

I would greatly appreciate a little advice from those of you in the know about these things.

6-8 weeks ago an unauthorised email (selling stuff from China) was sent to all my contacts from my hotmail account. On 22 December I was unable to access that hotmail account or my ebay and amazon accounts because the passwords had been changed. I reset passwords but the same problem repeated itself yesterday and I am frozen out again. I don't know if this signifies anything but if I key in specific words such as email, ebay, username, symantec, uk, oliver etc into either safari or firefox they appear underlined with a dashed red line.

Stupidly I am guilty of complacency as I believed Macs were invincible but I fear I was wrong. Today I installed Intego Virus Barrier from a CD and downloaded Macscan, but they didn't discover a thing. The operating system is OSX(10.4.11) and I have only had the Imac since August.

Any ideas? Thanks in advance.

Oliver

imac, Mac OS X (10.4.11)

Posted on Dec 29, 2007 11:36 AM

Reply
10 replies

Dec 29, 2007 12:27 PM in response to oegrant

They're hard to get, but there are a few Trojans out there that affect Macs. It sounds like you have a key logger that is sending the information to whomever is hacking your accounts. That's why they're able to get in even after you change passwords.

The only ways I know of to get malware on a Mac is through another program you download and install. Limewire was known to carry extra garbage that installed itself along with the main application. When Mac users found out, they complained loudly and the developers of Limewire took it out. But that doesn't mean they didn't put something else in. Likewise, it could have come from any other P2P software such as Skype, Gnuetella, etc.

The latest one is malware found mostly on adult web sites that claim you need to download a viewer in order to see the video you clicked on. It's no viewer of any kind, it's spyware.

Anytime you enter your user password when installing software, you're giving the installer permission to install anything in it, not just what you think it is.

The most likely suspect here is SH.Renepo.A / SH.Renepo.B, otherwise known as Opener. It is a known key logger among other nasty things it does. Norton Anti Virus for Mac can detect and remove Opener from your system.

Dec 29, 2007 1:19 PM in response to oegrant

I'm not sure if it's strictly a Mac virus/Trojan, or it will park itself on any Bluetooth device it can.

Here's a bit more on Opener. You can see how much damage it can do. Turns off your Firewall and hides itself, among other things.

I should clarify that I'm guessing you have Opener on your Mac since it's the only key logger I know of. You could try the free ClamXav. It may be able to detect and remove Opener.

Edit: According to Symantec's site, Opener can only run on OS X. Meaning it shouldn't be able to copy itself to a Bluetooth enabled phone and then to a Mac with Bluetooth open. Below is the text from Symantec's site on everything Opener can do.
<hr>
When the virus is executed, it does the following:
Deletes some UNIX commands and modifies preferences for other additional commands.

Launches a keystroke-mapping application (if installed) called Krec, to record the keyboard entry of passwords.

Modifies the hostconfig file, allowing Write access to all users and SSH access from the intruder's computer.

Gathers hash files (mathematical strings used to represent passwords and other sensitive data) to scan for passwords for every user, compares these hash files to a dictionary file to try to generate the appropriate passwords.

Turns on file sharing and remote login, then puts passwords and other sensitive data into an invisible folder named .info on each user's Public folder.

When active, the Activity Monitor shows a process called "john" eating almost an entire processor.

Requires one or more of the following to install this script and to copy itself to the startup items folder:

Admin or physical access (boot from a CD or firewire/usb, ignore permissions on the internal drive).
Write access to either /Library/StartupItems /System/Library/StartupItems.
Write access to any existing StartupItem (which is replaced with this script).
Write access to the rc, crontab, or periodic files.

Creates the startup item /System/Library/StartupItems named "opener."

Runs "john" (we assume as in "the Ripper").

Turns on some services and turns off others (including firewall services).

Runs as root, as no "sudo" commands are needed.

Copies itself to any mounted startup volume, before it kills utmp. When the virus connects, it is invisible to the user.

Note: The utmp file allows one to discover information about who is currently using the system. There may be more users currently using the system, because not all programs use utmp logging.

After disabling the Macintosh OS firewall, it changes the File Server preferences to make sure the Mac File Server does not log any Mac File Sharing.

Prevents Software update from auto-updating.

Looks for LittleSnitch software (a shareware Firewall program with application control) and tries to terminate the process, when LittleSnitch attempts to perform network access.

Searches throughout the computer for the following:
Serial numbers of installed applications.
Various preference files of installed applications.
Various user-specific preferences, including Classic files.

Modifies the LimeWire settings, deletes log files, and creates an admin level user named:

"LDAP-daemon"

so the machine can then be accessed in the future by a hacker who knows about this script. This user name will appear in the NetInfo Manager.

Installs a daily script to look for more passwords on the system that runs at 3 A.M.

Installs and runs two programs named:
"John the Ripper"
"dsniff"

which will gather data and attempt to isolate passwords contained within them, as well as any other 10.2 and 10.3 hashes.

Gathers data and attempts to isolate passwords contained within them, as well as any other 10.2 and 10.3 hashes.

Reviews the logs for any passwords found.

There appears to be no attempt by the script to send the passwords to an email address or FTP site. However, the computer's state is compromised to the extent that anyone with knowledge of the script could login and access the log files containing serial numbers and passwords.

Recommendations

Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.

If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.

Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services (for example, all Windows-based computers should have the current Service Pack installed.). Additionally, please apply any security updates that are mentioned in this writeup, in trusted Security Bulletins, or on vendor Web sites.

Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.

Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.

Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.

Writeup By: Yana Liu

Dec 29, 2007 1:22 PM in response to oegrant

Based on what I see in Symantec's breakdown of everything Opener does, and if Norton AV says it finds it, you'd be better off erasing the drive and reinstalling everything from scratch since it deletes some system files and modifies others. Norton may be able to remove Opener, but it wouldn't be able to resurrect missing system files.

Dec 29, 2007 1:33 PM in response to Kurt Lang

So, assuming the problem is 'opener', by erasing the drive and reinstalling OSX I would eradicate the problem? If thats the case it seems I don't have much to lose. Even if it turns out to be some other trojan/virus, it appears to be a pretty viable long-term solution if thats all it takes. Is there a catch I should be aware of?

Dec 29, 2007 1:41 PM in response to oegrant

Start by making sure your personal files are backed up. Erasing a drive will always eradicate anything on it, good or bad. An erased file can't load into memory since the OS will never attempt to read it. What I don't know is if Opener may be sitting on any other Macs, external drives or other media in your household. It may still be prudent to use Norton AV just to see if it discovers Opener on more than one drive.

Malware/trojan?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.