Type: _companion-link._tcp.local.

Hello


I apologize in advance for my imprecision in the use of exact technical terms. I am learning since recently. Please if you don't want to be courteous and provide help, do not reply.


I ran a Bonjour service scan on my Wi-Fi network and I got this result


MacBook Pro

- Type: _companion-link._tcp.local.

- Hostname: MacBook-Pro.local.

- IPv4 Address: 192.168.1.(...)

- Port: 58417

- Values: rpFl = 0x20000, rpHN = 83fe(....)4be, rpAD = 38f(.....)41cbfaa, rpBA = F63:(...)1:C1:9B, rpMac = 0, rpVr = 360.4


i am facing cyber security issues at the moment and seeing this worries me a bit, given some of the readings I saw out there.

Should I be concerned?


Thanks in advance!

MacBook Pro

Posted on Aug 1, 2022 11:33 PM

Reply
Question marked as Top-ranking reply

Posted on Aug 2, 2022 6:53 PM

Similar questions

13 replies

Aug 26, 2022 8:19 AM in response to LeGrandCondePrinceDuSang

If you have a breach as you are claiming, that is a legal matter.


Do you want to discuss your particular security issues, or do you want to learn about networking and mDNS/Bonjour?


Because the two parts of this question go in very different directions. And you best need an understanding of a normal network and of tooling snd protocols before digging into an abnormal network.


mDNS is intended to advertise service availability of features, and most malware prefers to avoid advertising its presence.


Companion is an Apple service. So too is a sleep proxy.


As for using s sleep proxy, the proxy doesn’t have the credentials on the proxied system. You might as well be discussing the effects of MITM, and at a comparatively awkward place given the proxy and the target can’t both be active.


Introduction to DNS Service Discovery

https://en.wikipedia.org/wiki/Bonjour_(software)

http://www.dns-sd.org/ServiceTypes.html


And if you have something advertising a sleep proxy, you know what that device is. Go check it. It’s either behaving normally, or somebody did substantial work to implement mDNS and a sleep proxy within whatever device is involved. Which seems very unlikely. And again, if your computer or your network is compromised to the degree claimed, wipe and re-load, or wipe-and-replace, are the primary options.


For security, you’ll need to learn more about both networking, and about vulnerabilities and exploits; about digital forensics. Start with the New OSX Book series of books for the former, and there are classes and books on the latter.


Usual reason for a mass compromise is bad or exposed or particularly reused passwords, or laxity around updates and upgrades, somebody locally and trusted is involved, or a target that’s worth a whole lot to exploit. In the lattermost case, getting specific and tailored security help is the usual path.

Aug 2, 2022 11:35 AM in response to LeGrandCondePrinceDuSang

That’s usually some part of Continuity, based on what is available on the ‘net. Whether that’s expected and notmal depends gretly on whether some part of Continuity is active and involved, and which can involve Apple TV netwotk activity. Activity which is quite common on Apple platforms, too.


Can we back up a few steps and dicuss the “cyber securty issues”? What might those “security issues” involve?

Aug 27, 2022 8:30 AM in response to LeGrandCondePrinceDuSang

I’m not in a position to provide forensics via a forum.


Nor to teach forensics, nor macOS networking, via a forum.


Unprompted log dumps are seldom useful for detecting a breach.


I’ve never met an unprompted log dump posted around here that was anything other than benign.


Remediation recommendations for a suspected breach: review equipment and connections and versions and update all, inventory equipment and apps, reset and reload suspected breached devices, robust and unique passwords everywhere, two-factor enabled, etc.


If you are a target for security attacks, forum postings are not the best place to acquire advice. Same for designing a network with lots of pieces, or networks with unusual security exposures.


And I seldom recommend using macOS as an expensive and awkward router/firewall/gateway/NAT box.


PS: https://en.wikipedia.org/wiki/Bonjour_Sleep_Proxy



Aug 2, 2022 6:47 PM in response to MrHoffman

Thank you very much for your answer. I would like to add that I have three MacBooks and this Bonjour service appears only on one device, the most compromised of the fleet.


The cyber security issues are a long story. There is a post on reddit about it, I am not sure if copy/paste the link here is allowed.

In summary an individual who had access to all devices and credentials for an extended extended period of time, informed me that He had been recording and storing all types of data on me, including 289 audio recording and for proof sent me a recording of a phone conversation I had made.


This prompted an audit of my systems (by and Apple agent on the phone and in store) and it was discovered that the MacBooks had been set up to be remotely accessed, users had been created, firewalls turned off, the keychain accessed (and that's only what was visible) etc...

In addition my internet accounts (Google, gmail, Facebook etc,...) had been hacked and my androids would receive unheard missed calls and when I tried once to call back the number, the android where the missed call occur started ringing.

The phones would send and receive text messages to themselves (4 digits codes) and for a while, whenever I would try to reset my Apple ID password, I would request and receive codes on my iPhone and once entered in the browser, they would simply not be recognized. Apple informed that these codes were not sent by them.

There's also a concern about internet spoofing. My network would suffer attacks, and the traffic would be redirected towards an unknown network (not my phones cellular network) with a different SSID than my ISP.

And lately there the discovery that a device I have never seen physically but that was part of my devices connected to the router, and that I thought part of the ISP equipment , is in fact a UPnP device, a virtual Cisco remote wireless controller, that manages and connects the network and the devices, and has several dangerous open ports including port 9999.


I think there's a link between the MacBook pro and the bonjour service and the Cisco WLC.

I changed the router twice since April, and modified all credentials on the router and on the Wi-Fi.It doesn't seem to stop the issue.


If you have any idea of suggestion, please feel free to share.


Best,

Aug 2, 2022 8:13 PM in response to LeGrandCondePrinceDuSang

This seems centrally a police / legal matter.


Given what is a catastrophic breach, I’d expect you were encouraged to wiped or reset all, and to reload all from known-good sources, and to enable and use new and unique passwords throughout. Everything. This breach would also necessarily involve local police and preferably legal representation, both for the reported electronic shenanigans and for the reported physical access involved here.


While parts of this are technical, you’ve undoubtedly already gotten good answers to those.


ARP spoofing is common for some benign network functions, not the least of which is a sleep proxy.


And that Wi-Fi security app might have gotten confused by a dual-band Wi-Fi router.


I don’t see anything here I’d be particularly concerned about, either. Well, other than resetting and rebuilding this configuration from parts, and discussions with police and prosecutors.



Aug 26, 2022 6:02 AM in response to MrHoffman

Hello and thank you so much for your answer. I have reported the breach to local authorities (to almost no avail).

Now I am looked into the sleeper proxy and I think that is what is happening here. Please check the link below from a capture from Wireshark

fe80::3ebd:c5ff:fe97:280b → ff02::1   ICMPv6 90 Multicast Listener Query

And which device acts as the sleeper proxy? Do you think you could explain to me once again how this would work?

The question I have, is can the sleepy proxy be used for the purpose of monitoring and controlling a network? Again the presence of this Cisco Remote Wireless Controller (that I can't even seem to be able to block from internet is troubling)!

Also I have been noticing more troubling details.

My screen keeps showing that it's being observed (although all my remote access have been disabled). Please see attachment.

And I noticed an unknown user logged into my computer when I checked on who logged. Please see attachment.

Thanks for the advice


P-S: Your advice on wiping everything is right. My online accounts have also been compromised.

Aug 27, 2022 5:57 AM in response to MrHoffman

Thank you so much for your great explanation. Would it be possible that my MacBook has been set up at an Internet Gateway?

I run the ifconfig and networksetup -listallhardwareports and I would really appreciate if you could tell me if anything leads to that conclusion.

I ll copy paste the extract I find troubling, and in addition two links from Cisco basically explaining how to install a WLC and keep it undetectable.

I'll add the the screenshots of the commands as well.

Thanks a million


Here's the line


id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0

maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200

root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0

ipfilter disabled flags 0x0



This was a capture from wireshark

239.255.255.250 SSDP 218 M-SEARCH * HTTP/1.1



Aug 27, 2022 6:21 AM in response to MrHoffman

Sorry I forgot to add the links

https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/116041-solution-apple-osx-00.html



https://superuser.com/questions/1707991/using-macos-as-internet-gateway


Now this is where it gets really interesting:

I can't seem to find it right away, but I will, one my connection showed as a 802.11 I ll add that screenshot shortly!

https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-6/config-guide/b_cg86/initial_setup.html


Release 7.6.120.0: This feature was introduced and supported only on Cisco 2500 Series Wireless Controller. It includes an easy-to-use GUI Configuration Wizard, an intuitive monitoring dashboard and several Cisco Wireless LAN best practices enabled by default.

Release 8.0.110.0: The following enhancements were made:

Connect to any port: You can connect a client device to any port on the Cisco 2500 Series Wireless Controller and access the GUI configuration wizard to run Cisco WLAN Express. Previously, you were required to connect the client device to only port 2.

Wireless Support to run Cisco WLAN Express: You can connect an AP to any of the ports on the Cisco 2500 Series Wireless Controller, associate a client device with the AP, and run Cisco WLAN Express. When the AP is associated with the Cisco 2500 Series Wireless Controller, only 802.11b and 802.11g radios are enabled; the 802.11a radio is disabled. The AP broadcasts an SSID named CiscoAirProvision, which is of WPA2-PSK type with the key being password. After a client device associates with this SSID, the client device automatically gets an IP address in the 192.168.x.x range. On the web browser of the client device, go to http://192.168.1.1 to open the GUI configuration wizard.

Note

This feature is not supported on mobile devices such as smartphones and tablet computers.

Aug 29, 2022 5:51 PM in response to MrHoffman

Hello

I wanted to thank you before closing down this post. I think I figured out the issue. I won't provide anymore picture of captures. The adversary has set up an IMGP Snooping.

Most of the foreign IP addresses on "Listen" state are hidden, but the few I traced, seemed to have ties with a well known dangerous cybercriminal group in France.

All the appropriate measures have been taken.

Thank you again for your great help!

P-S: During my research I found a very bizarre but hilarious post from someone claiming to have been hacked, and your handling of the comments is for the book.

I rolled on the floor when you asked about the presence of someone in the room while the alleged victim was screaming the password out loud.


Best Regards,


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Type: _companion-link._tcp.local.

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.