Factory reset macmini M1 2020 is not like the others

My Apple devices (less than a year old) have got issues I can't match to anything. I checked the Apple Boot Process guide and my boot appears to be a deviation?


Despite having this particular macmini factory reset at the Apple Store a few weeks ago, it will often run deprecated commands or invoke applications and processes that are a part of the Apple Open Source archive and behave like it is 2023 on the outside and 2004 on the inside.


First time the using in-built Apple apps like TextEdit there was irregular network activity. So I checked them in a sandbox and they contacted a lot of domains and IP addresses via TCP and UDP, added files, edited existing files including RemoteConfiguration.plist - amongst other things.


The firewall and stealth keeps getting turned off, or it will show as enabled in the control panel but disabled in the system report.


I've compared my files against unrelated external machines with the same specs and version there is a great deal of difference between them.


The new updates haven't improved anything. Have checked all the usual things. The Apple guy wouldn't say much other than it had been factory reset now, I waited 7 hours. He suggested I get a cyber security company, but I can't afford one and I'm out of ideas.




Mac mini (M1, 2020)

Posted on Apr 5, 2023 8:11 AM

Reply
Question marked as Top-ranking reply

Posted on Apr 15, 2023 8:26 PM

When you say 'factory reset' how was that actually performed? Was it the 'Erase all Content and Settings'? To be entirely sure install Apple Configurator from the Mac App Store on your second Mac. Obtain a Thunderbolt 4 USB-C cable. Use this guide to put the Mac Mini into DFU mode and use Apple Configurator to Restore the Mac to factory. It will download the signed Ventura IPSW file from Apple and then fully reset the Mac to factory. This should provide some peace of mind. Revive or restore a Mac with Apple silicon using Apple Configurator – Apple Support (AU)


The Apple logs are deeply confusing and full of a massive amount of debug detail that mostly internal Apple engineers can decipher. The logs are also scrubbed of sensitive data to protect privacy. This changed when Apple introduced the Unified Logging functionality. To learn more than you ever wanted to know about reading and parsing the logs see Howard Oakley's blog: https://eclecticlight.co/2021/09/27/explainer-logs/

He has several utilities to help with parsing and reading logs. Lots of posts that deep dive and provide useful insights.


In addition, there is the packet filter PF firewall that is ported over from BSD UNIX. A handy utility to help with configuring the arcane pf.conf is https://murusfirewall.com it's just a GUI to make things easier. Worth every penny in my opinion. Certainly easier than hard coding the rules in ViM. The PF firewall is built-in to the kernel and you can utilize both firewalls. The PF firewall is off by default. Murus has another app called Valium that can help with the Application Firewall. Another 3rd party firewall is Little Snitch.


As others have mentioned, it's highly unlikely your Mac has been compromised. It sounds more like you are accustomed to Linux and macOS is considerably different. Malware does exist but it's far more rare than other operating systems. You will find things are locked down tight with macOS. The System volume is entirely immutable. It starts with a read only volume locked with System Integrity Protection (SIP) then an APFS snapshot is made which is signed only by Apple and sealed. The OS actually boots from the snapshot. Apple Silicon Macs are using their own form of secure boot and don't suffer from the issues with secure boot on PC's. The SSD is factory encrypted out of the box. When you turn on FileVault you are merely generating some public / private keys, sticking the private key in the Secure Enclave within the SoC and using the public key to generate the recovery code. The disk is already encrypted. The built-in Apps such as Calculator are all coming from a signed installer and are entirely immutable. There is no way for malware or any user including root to alter the contents of Calculator.app/. Malware can infect a user profile but not the System and certainly not install a rootkit, etc. Apple's built-in malware tools autoupdate and can block malware. In the distant past it was first used to block vulnerable versions of Adobe Flash and Java. Prompting the user to go upgrade them before they would be allowed to execute.








Similar questions

36 replies

Apr 26, 2023 7:03 AM in response to MrHoffman

What it says and what it is are two different things. There is a process called SUOSU which removed the update notifications shortly after reinstall, disabled them and set major OS updates to ignore. When update is selected in system preferences it says it is up to date. A number of other settings say one thing, and do another. The SyncServices summary says Mac OS Version: 10.6 which is about the right circa for the sticky taped system they’ve cobbled together. It’s been in the iPhone for over a year undetected and from there into other devices as they’ve been purchased. Red Canary’s new tool was a great help in providing another angle as to the Mac’s behaviour.


I suspect the problem is larger than let on, time will tell.

Nov 4, 2023 3:44 PM in response to holymoly767

holymoly767 wrote:

I am, and have been for a couple years, experiencing almost the same thing and was wondering what to do. Most everyone says it impossible but looks like the community is showing otherwise. Is there a way to get everyone's data together and start compiling the info in one place? Or at least connecting everyone together since Apple is not addressing anything? With all the money spent on new devices, iclopud data lost, etc., the fact that they continue to deny any issue or put out security warnings is opening them up for class action, which I am happy to initiate. Their denial and lack of direction is a complete violation of consumer protection (what little the US supplies). anyway, Im beyond trying to troubleshoot devices and more into the next steps of getting this more public attention.


What to do? Learn about exploit tooling and about digital forensics and security, and collect evidence.


Evidence I’ve never seen posted around here, among the myriad “I’m hacked” threads.


Nobody is going to do digital forensics for free. Not at the scale involved. Apple is undoubtedly doing forensics analysis with their telemetry, and at a scale few here can imagine.


There are vastly more people claiming to be hacked than can possibly ever be examined, too. As many analysts as there might exist, there are far more claimants. Most of whom are not hacked. Not without some strong evidence of an exploit. Many of which would be unwilling to accept a “no” finding.


And there can be no certainty here too, as trying to prove a negative—that any particular configuration is not somehow compromised—is a fool’s errand.


Posting screen shots of, well, nothing is not the path.


PS: “Stealth” is a waste of time and network resources. Learn about ICMP, and about proper operation of IP networks, and then decide. Dropping parts of ICMP traffic makes the network less efficient, and for no added benefits. If an IP host is connected to an IP network, that IP host is inherently visible to at least ARP traffic, and almost certainly has some ports active.

Apr 13, 2023 6:03 AM in response to gravityfed

Attempted another factory reset tonight but it's still there. I can't find any way to remove the disk image it is defaulting back to.


kernel: vm_page_bootstrap: 995728 free pages, 13694 wired pages, (up to 0 of which are delayed free)

kernel: VM boostrap: 97 maps, 204 entries and 512 holes available

kernel: Maximum number of VM swap files: 100

kernel: "vm_compressor_mode" is 4

kernel: VM bootstrap done: 84 maps, 165 entries and 503 holes left

kernel: IOKit IOMD setownership ENABLED


I contacted the "Apple" chat help (on the malware machine so what did I expect I guess), they didn't know what a bootstrap was. So they got my number and a "senior technician rang" who also didn't know what it was for either.


How do I get rid of this?

Apr 13, 2023 7:52 PM in response to gravityfed

macOS protects itself against corruptions. Much of the system is write-protected, as are backups. That is all part of the built-in anti-malware. The built-in anti-malware which has blocked add-on anti-malware from corrupting macOS with a (hilariously wrong) false positive, too.


Absolutely nothing you have posted here so far is evidence of any issues. Which CVE, BTW?


Backups are a central part of system security. Quite possible rotating and maybe permanently-archived backups, if the data is sufficiently valuable.

Apr 14, 2023 7:57 AM in response to gravityfed

I would not be concerned about the log reports on the machine you posted the EtreCheck Report from. It is not unusual to see a log where a deprecated command was given. You will also see attempts to run a process that fail, networks getting disconnected, and write errors multiple times. It does not mean that your computer is not working correctly. There are no nefarious processes running at startup. Having network activity while an app is running is not always a sign that something bad is happening.


Just do your Factory Reset and enjoy, if a problem comes up, we are here to help.

Apr 14, 2023 8:59 AM in response to Owl-53

My apologies, I have a Mac mini and a MacBook Pro. I killed the Mac mini somehow yesterday with my attempts to get rid of the image file, so I had to post from the Pro and have mixed them up as I usually work off both at them at once.


I am unsure what you meant by the cut and paste comment. Do you mean by command + C / V in the additional text box? I just copied with the button from Etrecheck, doesn't give me any options when pasting. I won't paste the Mac mini one in that case.


I have reset previously using the Apple instructions as you have said, they are both on macOS 13, however they don't give me any option to review anything.


Basically, it appears all my Apple devices are somehow being managed, even though on the surface it says it isn't, there have been numerous things which suggest the opposite that are hard to articulate as it's all linked.


Well, it seems an issue that won't be solved here, was hoping for some more clarity around some of these processes. Thanks for your time anyway.

Apr 14, 2023 11:14 AM in response to gravityfed

gravityfed wrote:

Well, it seems an issue that won't be solved here, was hoping for some more clarity around some of these processes. Thanks for your time anyway.


There’s seemingly nothing to solve here; no evidence of anything untoward, no remote management, no (applicable) CVE.


If you’ve already done a nuke and pave of macOS, have enabled two-factor and new passwords all around, then there’s either malware far above the norm, or there’s hardware junk or other not-involving-macOS problems, or somebody local with direct access, or you’ll need some (better) evidence of something untoward.


To learn more about macOS internals as a foundation for your investigation, the three volumes of the New OS X book”, by Levin, are a good start. That will help you learn what is normal activity on macOS.


And few folks (nobody?) will perform digital forensics for free, absent some evidence of an interesting exploit.

Apr 15, 2023 8:15 PM in response to gravityfed

Teaching forensics, or performing forensics on a remote system via a text box, or teaching IP networking, one observation at a time, is not something that can reasonably happen here.


There are no UDP connections, as UDP is a datagram protocol. DHCP client (per RFC 2131) uses UDP 68, and your Mac likely has DHCP client enabled.


TCP 137 is tied in with NBNS and SMB network services. While NBNS usually uses UDP 137, it can use TCP 137.


etc…


macOS server was retired a while back, with many parts deprecated, and some parts moved into base macOS.


The rest here, do your research, as you have the computer locally, and you can look up what is in use, and what is currently active. Your follow-on replies here show deeper knowledge of networking and protocols, so I fully believe you are both best positioned to investigate and quite able resolve your own curiosity here, and to gather the necessary evidence.


This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Factory reset macmini M1 2020 is not like the others

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.