Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

How can I remove malware trying to phone home?

Hi,

I’m not sure when this started, but I noticed today that Firefox and Thunderbird try to connect to a known malware site. When I start either of these apps, Little Snitch shows an outgoing connection to R3.o.lencr.org. I did a search and found quite a few sites talking of R3.o.lencr.org as being malware, although most of the advice for removal was for Windows users. Here is what one said ...


R3.o.lencr.org can be deemed as a redirect virus. It is injected on your web browser by a potentially unwanted program (PUP) which generates numerous ads on most webpages you open. You should be on alert when you encounter endless R3.o.lencr.org popup or ads redirection. It is an obvious sign of virus infection.


What I’ve tried ...

- ran 3 different anti-virus apps (Malwarebytes, ClamXAV and Combo Cleaner), but none of them showed any sign of a virus or other abnormalities.

- disabled addons in Firefox using Troubleshoot Mode. Despite this R3.o.lencr.org still tries to connect until I block it with L/Snitch. (Path: /Applications/Firefox.app/Contents/MacOS/firefox)


I am slightly concerned because I was contacted by my credit card company last week to say that someone had fraudulently used my card on a now-disappeared website. My card details were stolen online.


So my question is, does anyone know how I might verify whether my computer is infected and, if so, how to locate and delete the thing? If this is not the case then why would these 2 apps (and possibly other browsers) try to connect to a known malware site?


Thanks


Note: I downloaded Thunderbird from Mozilla only yesterday and didn’t add any addons, so I was surprised to see the connection to lencr.org.


Mac 10.14.6, Mac Mini


Mac mini, macOS 10.14

Posted on May 2, 2021 7:54 AM

Reply
Question marked as Best reply

Posted on May 3, 2021 6:37 PM

amamik wrote:

I’m still in the dark about what I should do

Nothing.

r3.o.lencr.org is most likely malware.

It is not.

Maybe a bit extreme but I’m wondering whether I should uninstall my browser and start from scratch?!

No.

Similar questions

18 replies

May 2, 2021 6:55 PM in response to amamik

See if you have unknown Profiles.

To remove a configuration profile in macOS:

  1. From the Apple menu, select System Preferences....
  2. From the View menu in System Preferences, select Profiles.Note:
  3. Profiles won't be visible until you have at least one profile installed.
  4. Select the profile you want to remove, and then press the - (minus) button. Click Remove to remove the profile.


EtreCheck is a simple little diagnostic tool to display the important details of your system configuration and allow you to copy that information to the Clipboard. It is meant to be used with Apple Support Communities to help people help you with your Mac. It will not display any personal info.

https://www.etrecheck.com/


Pastebin is a good place to paste the whole report if you capture the URL while there…

https://pastebin.com/


Workable but harder for me to work with...the Note tool on the bottom of this editor's toolbar, as shown in the image, to copy and paste the output from EtreCheck. In a Reply before you click post, look for this to add longer texts...

May 3, 2021 11:11 AM in response to BDAqua

BDAqua wrote:

With R3.o.lencr.org I get...

Not secure warning in Brave browser.

Yes. That domain is used for certificate validation. If it used a secure protocol itself, then that would need to be validated too. And if that connection was secure, it would need validation, etc., etc., ad infinitum.


Secure certificates are used for two purposes:

1) to encrypt the data being transferred,

2) to guarantee the authenticity of the site.


For certificate verification, there is little need for encryption. The certificates you might be validating are not going to reveal any personal information. Certificates are, by their nature, public documents. There is a chain of trust that goes back to the certificate authority and this guarantees the validity of the certificate itself.


For any other data that you might transmit, the certificate is used to establish an encrypted channel so that neither your evil coffeeshop barista, nor government spies at an internet exchange point, can see the content of your web site. Strong browser controls will prevent mixing of insecure, http, content with secure content so that your evil baristas/spies don't even know what Javascript frameworks you are using. Let's Encrypt provides this level of protection.


Secure certificates can also be used to ensure that www.apple.com, or www.my-apple.com or www.apple-corp.com are actually Apple websites (only one of those actually is). For $300, you can pay someone to do some basic research and to call you and ask if you really own Apple, Inc. That will give you a fancy certificate. If you click on the padlock in the address bar, it will say something like this:


Let's Encrypt, even on their own site, doesn't have that second sentence there.


A couple of years ago, those fancy certificates would also turn the address bar green, but Apple and the other web browsers stopped doing that. Personally, I think that was a mistake. Of course, that doesn't stop some vendors of security certificates from advertising that green address bar that no longer exists. You still get the second sentence with your EV certificate, but no one ever checks that.

May 2, 2021 8:19 PM in response to BDAqua

Thanks for taking the time to reply.

There was no Profile to remove, possibly because I moved to this non-admin account recently.

The only possible issues that showed up in EtreCheck > Major Issues were a number of unsigned software files. Only one looked like it could be problematic (pfloggerd) but when I looked into it I found that it was part of the firewall I use (Murus). I’ve had this software installed on my machine for years and the company seems to be sound; lines 15-19


https://pastebin.com/wZB5erC7


I also checked out the website lencr.org (R3.o.lencr.org). It seems to be a legit site dealing with internet certificates and so on, but I don't know for sure. From their home page:


lencr.org is a domain owned by Let’s Encrypt. We use it to host OCSP, CRLs, and issuer certificates: all the URLs that show up in certificates.


If they are what they claim to be then that would explain the outgoing connections. But then again, I’m a bit puzzled as to why there are so many anti-virus web sites saying that R3.o.lencr.org is malware. For example:


How to remove R3.o.lencr.org redirect virus

R3.o.lencr.org Malware Removal Steps


Not sure whether I should keep it permanently blocked in Little Snitch or not. If it weren’t for the recent credit card theft it wouldn’t bother me.

May 2, 2021 10:42 PM in response to BDAqua

I moved from an old standard account to this new one a few days ago; that was after the credit card problem. So the new account might be ok. But like I said in my 12.19 pm post, the outgoing R3.o.lancer.org connections to a seemingly legitimate site are confusing when other sites say it’s malware. Not sure what that’s about.


Because 3 anti-virus apps showed no infection and my Mac seems to be working normally I’ll leave it as is and change my passwords on sites where I use my credit card. Perhaps it was stolen through an untrustworthy website rather than a virus. Who knows? If I have any further problems I’ll post again.


Thanks for your help.

May 3, 2021 7:54 AM in response to BDAqua

You made a typo, it should be R3.o.lencr.org/ (not lancer)


Typing in the full url brought up a Warning: Potential Security Risk Ahead page in Firefox, so I didn’t go any further. But typing in the domain, lencr.org redirects to https://letsencrypt.org/docs/lencr.org/ which looks like a legitimate site as I mentioned earlier.


Not sure if it'll help but I gave Etrecheck full disk access and posted the report here.

https://pastebin.com/ttW1RWLj

May 3, 2021 8:50 AM in response to amamik

amamik wrote:

The only possible issues that showed up in EtreCheck > Major Issues were a number of unsigned software files. Only one looked like it could be problematic (pfloggerd) but when I looked into it I found that it was part of the firewall I use (Murus). I’ve had this software installed on my machine for years and the company seems to be sound; lines 15-19

The next major version of EtreCheck will allow you to hide those unsigned files. I'm going to have to dramatically increase EtreCheck's malware detection and that will require better management of these kinds of user scripts.

I also checked out the website lencr.org (R3.o.lencr.org). It seems to be a legit site dealing with internet certificates and so on, but I don't know for sure. From their home page:

lencr.org is a domain owned by Let’s Encrypt. We use it to host OCSP, CRLs, and issuer certificates: all the URLs that show up in certificates.

Let's Encrypt can be a bit complicated. It is nice that they have that documentation site that explains it. The site is definitely owned by Let's Encrypt and any access to it should not automatically be assumed to be malicious.


That being said, you should not consider Let's Encrypt certificates to be a guarantee of authenticity. They are a guarantee of a secure connection to "a site", but anyone can get a Let's Encrypt certificate for a site. A Let's Encrypt certificate should make one less trusting of a site, not more trusting. Sometimes I've used Let's Encrypt certificates myself for testing and setting up new sites. But they are a hassle and I can't imagine why anyone would want to use one long-term for any real, production web site.

If they are what they claim to be then that would explain the outgoing connections. But then again, I’m a bit puzzled as to why there are so many anti-virus web sites saying that R3.o.lencr.org is malware. For example:

How to remove R3.o.lencr.org redirect virus
R3.o.lencr.org Malware Removal Steps

I strongly advise people to avoid doing their own security research on the internet. Virtually every hit you will get in your results will be malicious. If you don't already know which sites are legitimate and which are malicious, then you won't be able to tell the difference on your own. You are more likely to actually install new malware than remove any.

Not sure whether I should keep it permanently blocked in Little Snitch or not. If it weren’t for the recent credit card theft it wouldn’t bother me.

Little Snitch is another big annoyance. It is absolutely impossible for anyone to use Little Snitch to identify malicious internet sites. Everyone on the internet, from legitimate companies to malware developers, all use the same internet services. In many cases, they are using the same physical machines and sharing IP addresses. And of course, everyone wants their connections to be secure, and therefore encrypted.


You can use Little Snitch to block all network activity from a malicious app, but that's it. It is either all or nothing. More often, people use Little Snitch to selectively block activity from legitimate apps, to prevent them from "phoning home" and tracking the user, or validating a license code.

May 3, 2021 6:32 PM in response to etresoft

Thanks for the information. I get what you are saying but I’m still in the dark about what I should do, if anything. For the moment I’ve blocked r3.o.lencr.org in Little Snitch.


Before blocking it I did a small test using L/Snitch. In my browser I tabbed discussions.apple.com (only) then restarted Firefox. With no Allow or Deny rules set in LS, I allowed each individual connection to pass until r3.o.lencr.org showed. I then removed the Apple page and replaced it with blogger.com. After restarting the browser again, I did the same thing and got the same result. Maybe I’m wrong but it seems unlikely that Apple and Google would use lencr.org to authenticate certificates?


I also tried disabling my addons individually (except for NoScript and uBlock Origin) as I thought a malicious addon might have been trying to connect but they seem to be ok.


I strongly advise people to avoid doing their own security research on the internet. Virtually every hit you will get in your results will be malicious. If you don't already know which sites are legitimate and which are malicious, then you won't be able to tell the difference on your own. You are more likely to actually install new malware than remove any.


I agree with what you said but I pasted those two websites from a search engine search simply to show that r3.o.lencr.org is most likely malware. I’m careful not to install anything from sites like these. Doing a search on r3.o.lencr.org showed plenty of warnings about it including a youtube video done by someone with apparently nothing to sell or download.


Maybe a bit extreme but I’m wondering whether I should uninstall my browser and start from scratch?!

May 17, 2021 12:52 PM in response to amamik

Hi there,

I'd ran into this issue today. Macbook Early 2015 does not have this happening, running Little Snitch 4.


But, my 2020 MacBook Air M1, Little Snitch 5, which has not even been on the internet until a few days ago, it does. Pretty much any time it makes a request to the internet, a few seconds later I get a pop up for r3.o.lencr.org.


I'm somewhere between your two opinions. :) While the only pages I could find on the internet were poorly worded late 90s looking web pages talking in circles and trying to get you to 'try' this piece of software to see if it can help... so it seemed more that they were trying to get someone to run that program and then REALLY put a virus/malware on.


It did seem weird that it comes up on the MacBook Air, but I've never seen it on the 2015 and that's been my daily driver, and I drive a lot. But the explanation here makes me feel a lot better about things, especially since my new baby's only been on the internet a few days.


Now I get to go double check that for the first 50 websites before forgetting all about it.


My big concern is, after 6 years of hiding this 2015 away from Apple grabby hands, I had to open everything up just to log into this bloody site. (Must have Apple product, in your current possession, so you can log into your Apple account, or you can't come on here... even if you're offering help and not looking for it, and have it open so we can take that data you've been hiding from us, which is yours and not ours.) Seriously, I logged in, put my walls up, while I typed this out and it said my session had expired and had to do it all again.


No other company in the world has the audacity to literally force you to configure it the way they want you to. It's be like buying a car from Porsche and then they tell you that you have to drive it backwards and you're not allowed to paint it and only polka music plays on the stereo.

May 17, 2021 1:36 PM in response to Entreprenerdz

R3.o.lencr.org is a browser-redirecting app that attaches itself to the main browser in the computer and takes control over some of its settings. R3.o.lencr.org aims to bring different ads to the user’s screen and to promote certain sites by page-redirecting the browser to them.


There is a free Malwarebytes which may take care of it...

https://www.malwarebytes.com/mac/

How can I remove malware trying to phone home?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.