Apple Intelligence now features Image Playground, Genmoji, Writing Tools enhancements, seamless support for ChatGPT, and visual intelligence.

Apple Intelligence has also begun language expansion with localized English support for Australia, Canada, Ireland, New Zealand, South Africa, and the U.K. Learn more >

You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Unauthorized Apple classroom/managed Apple ID

Can someone shed some light on my situation. Who do I contact regarding unauthorized MDM, Apple classroom, and my devices being bound to these services. Erasing and reinstalling os has zero effect and during reinstall viewing the installation logs it contacts Open Directory node names network admin or domain admin. My Apple keychain which contains the rsa keys to log into my computer I cannot erase or even make changes to my keychain as all the options are greyed out. I’ve found the profiles which are hidden in the /private/var/db directory and it’s disturbing. The mdm server to start upon boot and furthermore disabling little snitch and malware bytes. Any insight would surely be welcomed I'm just assuming as I’ve even wiped my HD via bitraser and there’s a hfs+ volume that remains my assumption it there’s some MDM profile that cannot be removed other than by Apple? Thanks in advanced, JE

Posted on Nov 27, 2024 1:37 PM

Reply
Question marked as Top-ranking reply

Posted on Nov 29, 2024 7:05 AM

If you believe/see that multiple devices are affected, and doing a complete erase of your Mac isn't correcting the problem you see, then this is far beyond the ability of anyone in these forums, regardless of expertise, to offer any significant help. You really need to find an IT security expert to help you analyze what may be going on, from where any attacks, if attacks there are (and I'm not doubting you, we just can't know the full situation), are coming, and what to do to mitigate them. It's just far beyond what anyone can do remotely.


Regards.

11 replies
Question marked as Top-ranking reply

Nov 29, 2024 7:05 AM in response to Unauthorizedmanagement

If you believe/see that multiple devices are affected, and doing a complete erase of your Mac isn't correcting the problem you see, then this is far beyond the ability of anyone in these forums, regardless of expertise, to offer any significant help. You really need to find an IT security expert to help you analyze what may be going on, from where any attacks, if attacks there are (and I'm not doubting you, we just can't know the full situation), are coming, and what to do to mitigate them. It's just far beyond what anyone can do remotely.


Regards.

Nov 28, 2024 10:15 AM in response to Unauthorizedmanagement

In no particular order…


So far, you have posted no evidence. Suspicions, yes. Evidence, no.


The macOS default login system is based on LDAP. And macOS inherently integrates with LDAP servers. Which means traces of and references to LDAP will be widespread within macOS.


Apple has security mechanisms which do block various activities by add-in anti-malware as well as by malware, and not the least of which include the signed system volume, gatekeeper, notarization, and related.


And a Mac won’t erase completely, as features such as Diagnostics Recovery would not otherwise work. If you suspect a persistent compromise, that’s an exceedingly expensive exploit, and there’s no reliable remediation path short of wholesale hardware replacement from random sources.


Based on your postings though, you seem to have cross-platform concerns, though have posted nothing past having suspicions. No recordings of the reported snickering, for instance.


You have quite possibly also found the expected and normal indications of latent support for remote management features, and possibly also for some of uses of remote management related features such as for mundane activities such as for carrier Wi-Fi off-load.


Certificates are routinely found in keychain and within the trust store too, and certificates are a fundamental part of distributed authentication, and of app and network security. Apps can and do generate their own certificates, as do other activities. And the trust store contains the certificates Apple has trusted.


What are your own personal risks here? Are you an investigative journalist, political dissident, associated with a military or defense organization involved in active conflicts, senior in business or government, of interest to or an annoyance to some exceedingly rich folks or governmental agencies, exceedingly rich yourself or with access to riches, have access to sensitive or classified data, otherwise a potential target for malware?


There are forensics-related websites and training available, or you can pay somebody to examine your gear forensically. That won’t be free, as the folks that want free forensics far exceed those willing to offer that. Forensics usually also involves direct device access, which inherently includes access to sensitive data.


This reply likely won’t be satisfactory though, so I’d ask you what evidence you would accept of not being hacked. I ask that because proving a negative — that you are not hacked — is exceedingly difficult. If there can be no -acceptable evidence of not being hacked, then the discussion gets more difficult. Why do I mention that? There are those that will seek to profit from that fear of being hacked, as well. And this wouldn’t be the first case of gaslighting by a trusted associate.


TL;DR: this sort of request likely isn’t going to get resolved around here or from any other forums; not whatever security or gaslighting or maybe whatever other entirely-non-IT issue might be arising. Not without supporting forensics, some likelihood of being targeted by the sorts of malware involved in what is being reported. Or the cause can potentially be completely unrelated to IT.


Nov 28, 2024 5:11 PM in response to Unauthorizedmanagement

For what is reportedly happening, massively expensive espionage tooling and a budget to match is involved.


That’s well beyond the sort of assistance that can be offered in a forum.


Absent at least some forensic evidence of compromise, or absent a reasonable suspicion of being targeted by folks with those large budgets, I’d not expect free forensics assistance with this IT investigation, either.


Again, whatever is arising here is unlikely to be diagnosed in a forum.

Nov 29, 2024 6:38 AM in response to Unauthorizedmanagement

  • Hire a security firm.
  • If you feel you are being targeted - Contact FBI
  • If you feel Apple is involved - Contact FCC


All that has been done is outlandish claims have been made without wanting to provide any proof. As Mr Hoffman said, if you are a high profile target or government official that some foreign adversary would want to spend a considerable sum of money to monitor you, that is far beyond the scope of any solution you will find here. That scenario likely involves tapping into your cellular provider and physical surveillance as well. Changing phones or even the manufacture would not make those issues go away.


We have all seen the posts of users digging through log files and seeing words like "Roots", "Stingray", and "Goodnight, Gracie", and immediately thought they were being hacked. Even when showed they are normal terms on all devices with a completely different meaning then what they thought, they are still convinced that the government or somebody else is out to get them.

Nov 27, 2024 3:11 PM in response to Unauthorizedmanagement

Apple cannot remove an MDM profile. Only the school or company who set that up can. Did you buy this device used? If so, it was not properly prepared for resale and you should contact the seller and get them to correct the problem or give them your money back.


If this is a device provided by your school or company, contact your IT support resources for further guidance.


Regards.

Nov 28, 2024 8:56 AM in response to varjak paw

I believe I was rather soft in my description so to speak. No these are certainly not Enterprise or affiliated with any institution, they are personal devices, all purchased by myself and this issue spans my entire Apple ecosystem from iPhones to iPads to Mac computers to Apple TVs the attackers you can hear snickering and shushing each other in the background while I stream content from the Internet either on the TV or phone or laptop. As I mentioned, these profiles are hidden in private/var/db nowhere in the GUI will you see its presence in these configuration files. These said configuration files explicitly deactivating any antivirus that’s running and booting MDM server upon boot, I can erase and reinstall and during reinstall it contacts an open directory node named a domain admin or Network adminand as well, the devices will not erase completely, and all the firewall settings are left over and it’s worth mentioning that firewall, auth logs and any other logs that would be helpful in tracing its origin are all being sent to an outside ASL sender. This is without a doubt, the worst Malware infection one could possibly conceived of and what makes it very difficult is all these Are all legitimate Apple processes being used maliciously by what appears to be some rogue developers per the certificates in my keychain, which I cannot erase or make changes to either. This has been the most difficult situation one can describe don’t really know what to say! You mentioned get my money back. I would sure like that as I’ve continued to buy new devices feeling that new security and updated devices would be of benefit, but it continues to be the same or worse really I now have an M1 MacBook Air, an M3 MacBook Air 2M2 Mac mini‘s an iPhone 15 an iPad and an iPad mini, all of Which have been hijacked With no means of regaining control.

Nov 28, 2024 4:47 PM in response to MrHoffman

Mr. Hoffman appreciate taking time to respond however it’s not appropriate to be attaching the actual files as the current state of my systems are being monitored on the network level in hopes to trace them to their origins so we can harden our local network. But I have seen this countless times while reading these threads and it’s important for my sake that we-stay on topic. This is not an interpretation issue, these are legitimate Apple processes being used maliciously and I suspect on a grand scale i.e. meaning I am willing to bet most of my fortune that in the coming year, you are going to find out that this is a large majority of the user base at least those users that have both iOS devices in as well a macOS device and have an active Apple ID/iCloud account containing the devices. By the sounds of it you keep up on current state of affairs so you would know it’s over 150 times more likely for an Apple device to be compromised than any other device on the market these days, does this fall into that category absolutely, however a seemingly unconventional way of compromising or hacking someone’s device most certainly but I gotta tell you makes perfect sense. Apple has created this animal ie forks of the OS to integrate with MDM and enterprise management and they’re not policing who is being issued these extremely powerful permissions and this will never be caught by an antivirus at first glance, however, my Linux distribution put a halt to it, pronto simply due to system resource use. However Linux isn’t integrated with open directory, etc. where truthfully I believe the stems from and if you reread my two posts, it has all the pertinent information on what’s going on with my systems, but to simplify and add its most basic form as the admin of my computerI would like the ability to change my password on my local keychain and not have every option grayed out and as well when I erase my device and I open the network settings I don’t wanna see my firewall accepting all the connections from keygen wrapper and the handful of other vectors being used to compromise my system through network connections and is the reason I erased it in the beginning and furthermore, I would like the ability to go into the console and read my firewall logs if I have concerns, however as I mentioned those being sent to an ASL outside sender as well as my auth logs in any other important pertinent logs that would help me traced the origin. Lastly you ask about who I am IE political figure, etc. I don’t quite know how to answer that other than tell you that I own a challenger 604 and a Bell 429 of what importance that is I don’t know it certainly not driving force behind device hacking there’s other far more important forces like using your hard drive for crypto mining, data mining you name it none have to do with the size of a bank account you have so let me reel you back in Mr. Hoffman do you know of any internal contact within Apple that is Monitoring who is being issued and as well who is intern installing these mobile device management profiles, and/or Apple classroom profiles on their customers devices? That would be of much help moving forward thanks!

Nov 29, 2024 6:43 AM in response to MrHoffman

Mr.-you’re doing the community of major service by making it sound as if you come from a place of authority on the subject, it is clear very clear that you have very limited understanding of so please allow my question to be answered by someone that has knowledge of network devices and or open directory/MDM/Apple classroom thank you! there’s no sense in chewing up my airtime on a question that is very serious in nature That you’ve clearly stated, do not have an answer to please!

Unauthorized Apple classroom/managed Apple ID

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.