EFI Malware - DNS Hijacking

I have not been able to get much support or info back from Apple and I cannot afford a forensics team right now.


I know everyone says this kind of stuff isn't possible but I can confirm that some of it is. I have read most of the reports of the more advanced malware and dns hijacking techniques but due to my lack of expertise in this area it's been hard to be sure.


I believe I am infected with mojo_thor efi malware as how Rick describes it here is very similar to how I experienced it and still am. I don't want to waste a bunch of time so if you ask for logs or proof I'll do my best to get you exactly what you need to see. I have been trying to learn essentially how the inner workings of enterprise management tools and the OS work and for now it's more than I can handle.


I do know I have been under attack and I highly suspect it is stemming from my apple devices. I may, I know 100% that there are things I think are evidence or something malicious and they won't be. I've read every forum post like this and know it's going to be people giving me a hard time if I do that. Please hang in there I have spent enough time with this to know something is going on and I have almost a year of documentation, logs and photos and will as directed update here for anyone that is willing to help.


The stuff I post will not be in order of what's most convincing. If I post it it probably means it was or is the latest thing I'm trying to rule out and understand. If you want a log just ask.


Thanks,



First up and is pretty off topic unless there is EFI bootstrapping during boot but does anyone recognize failure installing with these errors and process.





Posted on Feb 28, 2021 11:43 PM

Reply

Similar questions

50 replies

May 17, 2021 10:24 PM in response to MrHoffman

I agree with you fully and tbh I have gone to great lengths to learn as much as I could alone over a year. I provided apple with constant sysdiagnosis over a year as well and honestly felt pretty bad for contacting support and having it escalated to the engineers.


That being said one of my responses from the engineers was "How to reinstall an OS" which gave me the impression they didn't read the report or best I could do in summarizing my findings. I was attempting some pretty advanced stuff trying to provide them what I thought they might need to investigate. I offered to do as much groundwork for them as possible if they could just explain to me what I needed to gather or test.


The problem is Apple is somewhat a blackbox when it comes to security and for someone who works in IT I realize they cannot do everything and frankly they probably don't care for older models that soon will be obsolete. I also know it's 99% likely I am wrong and they are correct but here is the problem or the issue I had with them.


99% of their users call about god knows what and I don't blame them for not taking it seriously. But what seemed to happen is I sort of fell into a group they just don't support. I know enough to test and learn at a pretty granular level but that is very different from understanding the OS or security framework in any depth. I am able to identify stuff I know for sure is malicious or at least very abnormal but not enough to confirm my suspicions or what evidence I have. I understood this and went out of my way to try to do as much as I could on my end to be sure before I reported it and offered to test or provide anything they needed. I have all the data preserved across 4 drives now removed.


I couldn't even get an answer from the engineering team. Anyone I could reach by phone would assure me what I am talking about is impossible but that's just because they don't know about this stuff and they just go with what they have heard. I don't blame them but as I tried many times to just talk with with someone in the engineering team to just basically say "are you positive this is nothing?" and ask for a very high level explanation of what I would need to learn in order to verify that on my end.



Searching logs and trying to learn about how persistence would work at the hardware level one of my searches lead me to a github repo of a security researcher who literally describes something that is almost exactly as I described it in my first support ticket to apple. He had reported it to the FBI and they gave him some info on it and confirmed it was indeed malware even though Apple says it isn't.


rickmark commented on Oct 10, 2017

To be utterly overt, the FBI has confirmed MojoKDP / Thor and Loki as malware. I have received permission to publish from the San Francisco division, and you can plainly see that this is an old version of the firmware vs. your repository for that model.


rickmark commented on Dec 4, 2019

This is in fact an internal tool used by Apple developers that has been weaponized. MojoKDP provides a kernel debugger on the same box, and has no purpose on consumer machines


source: https://github.com/rickmark/mojo_thor/issues/1

source: https://github.com/rickmark/mojo_thor


The problem is this, if this is indeed what I have would apple even acknowledge it publicly or to me? From what I understand there may not be a fix for this once the loophole has been exploited so if that is the case I assume their policy would be patch it moving forward and stay a quiet about it as possible if it cannot be fixed.


Ok I understand that is the approach that actually makes sense to take for them as a company. But then what is the user who has this supposed to do while being hacked and asking for some help identifying if this is indeed on their system. I haven't been able to confirm anything yet as it's beyond my skill set but if their engineers were aware of this based on my reporting and they told me I have nothing to worry about but they knew that not to be the case that is really leaving their better customers out to dry and exposed. Once I realized this I tried to ask what they can even disclose and if they would indeed tell me if it hadn't or wasn't able to be patched and no one could even give me an answer. I then realized how big of a problem this sort of closed environment security policy is going to be once really bad malware gets widely distributed via a leak or a team publishing it.


Sure my case I'll assume I'm wrong but that doesn't mean cases like this won't come up and when they do in mass I cannot see apple being able to handle the damage control. I'm actually very interested to see their approach to this issue.


I did learn about remote jailbreaking espionage 0 click malware that is out in the wild and from what I know Apple was able to patch for it in 10 days which I have to say is absolutely unheard of. Maybe they will be able to pull it off. I hope so.

May 5, 2021 8:27 PM in response to VikingOSX

To be honest I know they don't from first hand experience of trying to get support for an issue I can't fully be expected to be able to troubleshoot myself. Its possible I don't have what I suspected but the malware I am referring to is out in the wild and has been confirmed by the FBI as malware even though Apple doesn't. Here is rickmark discussing what he learned from the FBI. It's way beyond what most people can even identify and I'll give apple the benefit of the doubt but me posting this here was because I was unable to get any support from Apple or even be taken seriously.


rickmark commented on Oct 10, 2017

To be utterly overt, the FBI has confirmed MojoKDP / Thor and Loki as malware. I have received permission to publish from the San Francisco division, and you can plainly see that this is an old version of the firmware vs. your repository for that model. You can also see the differences in the firmware dump as posted in the repository and I'd draw your attention to MOJO and STDK in the SMC as the decryption keys for a few LZMA compressed images in the firmware that are part of the DSMOS model of encryption of portions of the firmware. It is needed to dump the contents of the SMC before we can fully evaluate the differences in the firmware.


-----------------------------------------


rickmark commented on Dec 4, 2019

This is in fact an internal tool used by Apple developers that has been weaponized. MojoKDP provides a kernel debugger on the same box, and has no purpose on consumer machines


Source: https://github.com/rickmark/mojo_thor/issues/1

Mar 2, 2021 8:47 PM in response to REPORTED_THIS_FOR_9_MONTHS

At this point I am going to just start dumping everything I have collected over the past year. I have spent so much time trying to learn this stuff to not waste apples time but I have done everything I can at this point. I have had multiple banks hacked, all emails a few times until I got them all on yubikeys, socials, data and every computer / cloud controlled network gear I now have. Apple has told me all year I have nothing to worry about and yet I told them I clearly do and it turns out I did.


I will say most the stuff I will post I believe is not evidence of anything. Now that I have spent this year learning how this all works I realize it works against me just seeming crazy but even if someone recognizes something malicious in a random place and it helps me get the the end I'll be happy. At this point I have nothing left to lose. The only way I can mitigate it is by removing the airport cards in my laptops and reseting every device and the network. If I connect those laptops to the network at any point it will start up again. And yes I know to just get rid of the laptops... but I'm stubborn and I want to know what this is. I would like an expiation from apple as to how if that is the case why it still happens if I clean install via usb or internet recovery on those devices it will continue to happen.



I will do my best to run any tests you request and I apologize to all the devs that get tired of seeing posts like this. I have tried very hard to just assume I am reading into the wrong things and it's in my head but I no longer can believe that. If someone can help me tighten the scope I can post more granular logs and tests if you are curious. I have experienced everything form a Mikrotik RouterOS evil twinning my router where I got to it's login page at my own routers IP to DNS hijacking, to a cert being installed on my dream machine pro. I confirmed that with amazon who was listed on the ssl cert the day it happened. I run all devices I own on different isolated vlans, have run hypervisors to monitor and talked with every other company from ISP to mobile provider and no one cares or can do anything. I hope one of you will find this interesting if not even entertaining to see how wrong I have been in the past as I learned. Either way I know a lot more then I did about macOS so I don't see it as just time wasted.


Here come the logs and screenshots. Ask and I'll provide you with whatever I have. If you think I'm crazy just hold tight I will be wrong about some stuff but I promise there are things that even you will find interesting.

Mar 4, 2021 2:59 PM in response to BDAqua

Sure clean install is booting to external usb that contains a osx installer. On boot clear pram. While booted there diskutil reformat entire drive. View - Show all devices and top physical disk. Shutdown clear pram on boot and boot back to installer usb and install. I've done it across every os going back to maverics on this machine and I have spent a lot of time tryign to deal with it. I know people will think I'm being crazy but I tried as hard as I could to learn how this all works.


See if you have bootbase.efi here /System/Volumes/Data/boot/

Mar 30, 2021 7:42 AM in response to REPORTED_THIS_FOR_9_MONTHS

If you were targeted with sophisticated and persistent malware—and that’d make you a fairly important target for some very well funded entity—you already know what to do: replace all your hardware. Don’t migrate. Replace. Computers, networking, all connected devices. Source the replacements directly from the stock of randomly-selected vendors, not shipped.


May 6, 2021 7:01 AM in response to Swoup

You need to learn about malware, to do the work, and acquire the evidence.

Or pay somebody to do the related forensics work.

Which can be expensive, tedious, and time-consuming.

A whole lot of folks here make these claims, few have proof.

Most have had something else happen; software and hardware problems being common.

Exposed passwords, phishing, DNS, lots of ways to get into trouble.

Apple can’t possibly investigate every claim.

Particularly claims as nebulous as this one, no offense intended.

Extraordinary claims need something approaching extraordinary proof.

May 18, 2021 8:29 AM in response to REPORTED_THIS_FOR_9_MONTHS

There is room here to learn more about keychain and its content and functions, and about not posting potentially sensitive data (such as email addresses), and about the limits of posting images. You will want and need to learn about malware too, and the work involved in determining risks, and in monitoring and detection. Which isn’t going to involve screen shots. Or you will want to pay somebody to teach you about or to perform the related forensics work. Work which can be expensive, tedious, and time-consuming. Not the least of which involves is reviewing the installed certificates. Which isn’t going to happen here, and not from images.


Available trusted root certificates for Apple operating systems - Apple Support

Apple PKI - Apple

https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf

etc.

May 25, 2021 8:46 AM in response to j2dkno1

Build a technical case with evidence of compromise(s), and there’ll be (more) interest.


Acquire the Apple internals book, acquire the Darwin source code, and acquire some texts on computer forensics and reverse engineering topics, and have at.


And if you want detailed and low-level control over what is happening with whatever platform you choose, you’ll likely want to migrate to Linux, BSD, or another similar platform that targets that market. macOS does not. And this is not to imply no Linux or BSD malware exists, nor that Linux or BSD are flawless and free of issues or compromises. Having source access will give you more insight into the what and why, which you’ll only get with far more effort and reverse engineering with macOS. And yes, I know you will not want to migrate to some other platform, and for any of various other (good) reasons. Which means you’ll be spending time learning forensics and reverse engineering.

Jun 9, 2021 8:37 AM in response to AutoGenetix_Design

There are forensics classes, malware analysis publications materials, and "blue team" training programs around, and there are materials on securing computers against unauthorized access.


I'd suggest starting there, and with gathering evidence of compromise.


From Apple:

https://manuals.info.apple.com/MANUALS/1000/MA1976/en_US/device-and-data-access-when-personal-safety-is-at-risk.pdf


A list of some Mac forensics tools from a book on this topic:

https://docs.google.com/document/d/1xOWmMueHHRke9aj3oRqNBgK69Y19hgZ7ehM4H9_Me-Y/edit


I'd avoid running tools that make changes to your system and your security configuration for now, as security-related changes can potentially introduce problems for apps that you want and need. Have backups beforehand, if you do.


And with apologies, I'm not in a position to switch over into a forensics-related investigation.


Mar 1, 2021 1:44 AM in response to REPORTED_THIS_FOR_9_MONTHS

Update here is the system profile.


https://privatebin.net/?a42b704abcd71a90#A4EVFxAmfxXawrW4odXYfLVRzA2uWfvRf4mrg4Lz77s1


I am not a dev and I probably have destroyed this OS investigating things. I assume there should be some issues but figured it may be a good baseline for the system. Maybe someone will spot something.


Apps I have installed and know. More than half of these were installed to do further diagnostics on the machine. If you haven't seen https://eclecticlight.co/ check it out, there are a lot of really helpful resources and software there.


The Electric Light Company

ArchiChect.app

Cirrus.app

xattred.app

DelightEd.app

Podofyllin.app

Dintch.app

Fintch.app

Metamer.app

PermissionScanner.app

Bailiff.app

Revisionist.app

DeepArchive.app

DeepCopy.app

DeepUnarchive.app

Apfelstrudel.app

Dystextia.app

Alifix.app

UTIutility.app

Nalaprop.app

SearchKey.app

SearchKeyLite.app

Pratique.app

Sandstrip.app

KeychainCheck2.app

Signet.app

Whither 2.app

Whither.app

RouteMap 2.app

RouteMap.app

Mints.app

LockRattler.app

SystHist.app

RepairHomePermissions.app

Taccy.app

Stibium.app

Rectangle.app

Ulbow.app

Precize.app

Consolation3.app

SilentKnight.app



Setapp

Photolemur.app

Luminar Flex.app

PhotoBulk.app

Base.app

ForkLift.app

iThoughtsX.app

Dropzone.app

MacPilot.app

AnyTrans for iOS.app

Commander One.app

Gitfox.app

HoudahSpot.app

Movist Pro.app

TablePlus.app

DevUtils.app

TextSniper.app

Disk Drill.app

SQLPro for SQLite.app

Downie.app

Image2icon.app

Ulysses.app

SQLPro Studio.app

DCommander.app


Automator Apps

Import Folders of Image Files into Library as Albums.app

Export Albums to Folders.app

Import Folders of Image Files into Library as Albums-Version 2 2.app

Import Folders of Image Files into Library as Albums-Version 2.app

Export Albums to Folders-Albums SORTED.app

Create folder based on name.app

Export Albums to Folders-Albums SORTED 2.app

Export Albums to Folders-Albums SORTED2.app

I think this works.app

Flatten Folder Structure.app

Folder Structure to Albums.app

Gather Files To Folder.app

PhotoGrok.app


Android File Transfer.app

AppCleaner.app

TaskExplorer.app

Geekbench 4.app

Sublime Text.app

Geekbench 5.app

App Store.app

Automator.app

Books.app

Calculator.app

Calendar.app

Chess.app

Contacts.app

Dictionary.app

FaceTime.app

Find My.app

Font Book.app

Home.app

Image Capture.app

Launchpad.app

Mail.app

Maps.app

Messages.app

Mission Control.app

Music.app

News.app

Notes.app

Photo Booth.app

Photos.app

Podcasts.app

Preview.app

QuickTime Player.app

Reminders.app

Safari.app

Siri.app

Stickies.app

Stocks.app

System Preferences.app

TextEdit.app

Time Machine.app

TV.app

Voice Memos.app


Disk Drill.app

Transnomino.app

FSMonitor.app

Macs Fan Control.app

BlockBlock Installer.app

TheTimeMachineMechanic.app

iBoysoft NTFS for Mac.app

MySQLWorkbench.app

BBEdit.app

LuLu.app

Adobe Creative Cloud

Adobe Creative Cloud

Uninstall Adobe Creative Cloud

Adobe Photoshop 2021

Adobe Photoshop 2021.app

PortraitProBody Studio.app

4K Stogram.app

JDownloader2.app

Utilities

Activity Monitor.app

AirPort Utility.app

Audio MIDI Setup.app

Bluetooth File Exchange.app

Boot Camp Assistant.app

ColorSync Utility.app

Console.app

Digital Color Meter.app

Disk Utility.app

Grapher.app

Keychain Access.app

Migration Assistant.app

Screenshot.app

Script Editor.app

System Information.app

Terminal.app

VoiceOver Utility.app

Adobe Application Manager

Setapp.app

Google Chrome.app

Microsoft Word.app

Microsoft Excel.app

Microsoft PowerPoint.app

Microsoft OneNote.app

Microsoft Outlook.app

OneDrive.app

Endpoint Security for Mac.app

Bitdefender

SecurityNetworkInstallerApp.app

EndpointSecurityforMacUninstaller.app



Mar 4, 2021 10:12 AM in response to REPORTED_THIS_FOR_9_MONTHS

Languages switched and I'm not sure if those cookies are normal this happened a long time ago. I believe this was either a chome account being compromised, man in the middle / evil twin of the router or dns hijacking. I have video of how messed up the browser gets, almost like all the frames are crumbling and overlapping. This sort of attack or something like it would happen almost every night at around 2am -4am. My network would go down and different attacks would happen. I'll see if i have videos from then if anyone wants it.

Mar 4, 2021 4:27 PM in response to REPORTED_THIS_FOR_9_MONTHS

Ok sorry it took me a while to find the pic. I know everything up to this point could easily be nothing or something harmless. I would eventually start to think I had to be just making this up and right when I started to think I was crazy this happened. I was setting up another router and when I went to the IP of the Orbi I was taken to this page. A Mikrotik running RouterOS.


I have unifi everything now and I'v4e monitored the other APs near me and none are from Mikrotik. Never seen one in my life besides this instance and it freaked me out. I had suspected they were using OpenWTR and evil twinning my router back when I just had spectrums but without the right hardware it was hard to do anything. If someone knows what they were attempting with this device please let me know. I assumed it was the device being used for DNS cache poisoning, dns highjacking or it's a botnet.


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

EFI Malware - DNS Hijacking

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.