How can I verify the security of my MacBook after an Apple tech remained remotely logged in?

Concerned...Yesterday a Mac tech (Matthew) from Apple spent over an hour on the phone assisting me with my MacBook. He had access to the system settings, helped reset my Apple Id Password, I logged in and out of iCloud (which only asks for my MacBook login password, not Apple Id's) and more with his guidance. Seemed super nice, and wasn't in a hurry or concerned about time spent. We eventually ended convo, and I proceeded to work on security issues (changing logins, passwords, moving docs, etc.) only to realize two hours later that Matthew was still remotely logged into my laptop. I immediately ended that, but am now bothered and paranoid. If he was a true Apple tech (which I did hear other agents in the background, but I suppose that could be recorded chatter?) why wouldn't he disconnect remote access when he ended the call or at the very least be disconnected when starting another support call?

The whole point for the call was with security issues and now I am unsettled and not sure if I compromised my security further. Is there any way to know for sure? Where could I look to see if his specific access during those two hours did or changed anything? Are there any specific ways or guidance suggestions for this?



[Re-Titled by Moderator]

Original Title: Apple agent did not end remote access after call had ended...what steps to do now, trying to know more about it if possible?


Posted on Jan 31, 2026 5:30 AM

Reply
Question marked as Top-ranking reply

Posted on Jan 31, 2026 9:13 AM

Did you initiate the Support call from the number here:

Contact Apple Support - Apple Support


Clicking a link in a Google search for Apple support has been seen as problematic as scammers will pay Google to have their link appear closer to the top of the search.


At this moment, I would recommend to post the free EtreCheck report using the Additional Text option when posting to see if there has been any software installed on your computer that may have been used for this Remote Connection or other purpose.No personal information is included in this report. Do you know what app was used to share your screen?

How to use the Add Text Feature When Post… - Apple Community


You would want to make sure the changes to your Login and Apple Account password occurred AFTER the connection was closed and if not, change them again. There is not a specific log that will track what changes that occurred in those 2 hours.

22 replies
Question marked as Top-ranking reply

Jan 31, 2026 9:13 AM in response to Tamlouie

Did you initiate the Support call from the number here:

Contact Apple Support - Apple Support


Clicking a link in a Google search for Apple support has been seen as problematic as scammers will pay Google to have their link appear closer to the top of the search.


At this moment, I would recommend to post the free EtreCheck report using the Additional Text option when posting to see if there has been any software installed on your computer that may have been used for this Remote Connection or other purpose.No personal information is included in this report. Do you know what app was used to share your screen?

How to use the Add Text Feature When Post… - Apple Community


You would want to make sure the changes to your Login and Apple Account password occurred AFTER the connection was closed and if not, change them again. There is not a specific log that will track what changes that occurred in those 2 hours.

Feb 3, 2026 4:34 PM in response to Tamlouie

Tamlouie wrote:

I realize I may be asking too much, and I want to end the thread, but can anyone:
1. offer a reason as to why the tech would "remove" XProtect from the Files & Folders and Full Disc Access when it would appear there was a good reason for it being there, ...


Yes. The reason was so that the criminal can bypass XProtect to install something on that Mac. Since there are no valid reasons to bypass XProtect under any circumstances, it can be assumed that something was malicious.


EtreCheck is a wonderful tool but it cannot provide absolute assurance that malware had not been installed and activated to do whatever the criminals intended to do. Nothing can do that. That presumed malware may remain active, or it may not, but in any event the damage is done, and it may be ongoing.


Erase the Mac.


I don't consider myself a hacker by any stretch of the imagination, and I'm certainly no criminal. I'm not even a particularly good programmer. But given remote access to a Mac it would be a trivial matter to install malicious software right under someone's nose — assuming of course the user is not particularly sophisticated.


For what it's worth contacting Apple Support should only be initiated using the Support link on these pages. If you are fortunate enough to eventually speak to a legitimate Apple Support representative, he or she will be limited to remotely viewing your Mac (with your explicit consent) in an innocuous manner by positioning a pointer on the screen and asking you to perform certain actions so indicated.


Erase the Mac.


2. what has caused the issues following his remote online access even though the Etrecheck report seems clean?


The cause may never be known.


Erase the Mac. There is no practicable alternative to assuring it is completely free of malware.


Given the extent of the intrusion your problems may have just begun. MrHoffman touched upon the reasons in the earlier thread.


Erase the Mac.

Feb 1, 2026 5:00 PM in response to Tamlouie

Tamlouie wrote:

If he was a true Apple tech (which I did hear other agents in the background, but I suppose that could be recorded chatter?) why wouldn't he disconnect remote access when he ended the call or at the very least be disconnected when starting another support call?


People who talk to scammers often hear other scammers in the background. Hearing other people talking in the background just suggests that you were talking to someone working in a call center, whether that call center was one belonging to Apple Support, or one belonging to a scam "business".

The whole point for the call was with security issues and now I am unsettled and not sure if I compromised my security further. Is there any way to know for sure? Where could I look to see if his specific access during those two hours did or changed anything? Are there any specific ways or guidance suggestions for this?


At a minimum, you would want to take Mac Jim ID's advice:


"You would want to make sure the changes to your Login and Apple Account password occurred AFTER the connection was closed and if not, change them again. There is not a specific log that will track what changes that occurred in those 2 hours."


The question would be whether the session left unwanted stuff behind, like a key logger or other spyware to steal sensitive information and relay it back to a scammer.


You may also want to check Settings > General > Sharing and make sure that any sharing options that you aren't using and don't want to use are turned OFF. But without knowing whether you called a legitimate Support person, or a scammer, it is impossible to give any absolute assurances as to what might have happened.

Feb 3, 2026 7:23 PM in response to Tamlouie

XProtect is but one aspect of this compromise, and it was presumably disabled because of other changes.


There’s no reason to disable XProtect unless there are other system changes being made, and some of which might be detected by XProtect. But quite possibly not all of the other changes being made will be detected.


What to do? Restore your most recent backup from immediately prior to the breach, and reset all passwords, all passkeys, and enable two-factor authentication where that’s both available and not already enabled. Unique and robust passwords, too.


Payment cards and other sensitive data that may have been recorded in local files are also all at risk.


Your circle of contacts can also now be receiving targeted phishing messages too, along with other fallout.


”Nuke and Pave”, in the vernacular.


The other thread: https://discussions.apple.com/thread/256232055

Feb 3, 2026 12:32 PM in response to Tamlouie

Tamlouie wrote:

Unfortunately he was not who he pretended to be and my system isn’t working as normal. As I stated to Jim, the pretender Matthew removed Xprotect as a security precaution and now I know that removed protection which I need to get back somehow.

As also stated in your other post, you can verify if you have the latest XProtect update. XProtect Updates are performed with the XProtectPlistConfigData installation. Yours should be version 5326, although version 5327 is in the works. You can verify the version currently installed on your device by going to the Terminal app in your Utilities Folder. Enter this exact command and you will then be required to enter your computer password. When you enter the password, nothing appears on the screen so just enter it and hit Return:

sudo xprotect check


I suspect yours will look something like this showing that version number:

Current update: date: 2026-01-22 19:13:41 +0000 version: 5326

Feb 3, 2026 9:46 AM in response to Tamlouie

Tamlouie wrote:

How do I run Etrecheck?

The download link is included in this user tip. You can then launch the app to produce the report and follow the rest of the instructions here to copy the report and paste it into a reply here using the Additional Text option to avoid the character limit of a post.

How to use the Add Text Feature When Post… - Apple Community


Feb 3, 2026 11:37 AM in response to Tamlouie

Tamlouie wrote:

<Etrecheck.log>
The date spoken to "agent" was 2026-01-26

You have no nefarious files that have been installed on your computer.


You are running low on Free Disk Space and should be looking for ways to delete unused data. Start with your Desktop, Downloads, and Documents Folders and any third party Applications that you are no longer using should be deleted from your Applications folder.

Feb 3, 2026 3:51 AM in response to Mac Jim ID

The number I used was in my contacts which is 800-MYAPPLE, which is not any of the numbers listed in the link you provided.

I don’t know what remote app he used.


I was unsure on the password timing for changing it so I changed it after reading you guys’s responses from my phone. However, the MacBook is not working correctly and my other email accounts are not working as normal, so I have limited use of it until I have clarity how to proceed

Matthew (the poser) did remove Xprotect from in my system settings as a precaution when ckg my system for anything abnormal. I now know that removed security protection, but I don’t know how to get it back.


Knowing that my system definitely has been compromised would it be safe to run Etrecheck and post or could they interfere with it?


Feb 3, 2026 4:04 AM in response to Servant of Cats

Unfortunately he was not who he pretended to be and my system isn’t working as normal. As I stated to Jim, the pretender Matthew removed Xprotect as a security precaution and now I know that removed protection which I need to get back somehow.


I did check the sharing as you suggested and that was/is all off but printer sharing.


trying to figure out where to go from here.



Feb 3, 2026 12:02 PM in response to Tamlouie

Tamlouie wrote:
Unfortunately he was not who he pretended to be and my system isn’t working as normal. As I stated to Jim, the pretender Matthew removed Xprotect as a security precaution and now I know that removed protection which I need to get back somehow.

I am not convinced that XProtect was either disabled or removed. The OP has been participating in another thread about XProtect and the evidence there and in the Etrecheck report points to it running as it should. I have advised the OP to use this thread exclusively.

Feb 3, 2026 2:14 PM in response to stedman1

Finding out that he had remained remotely online over two hours after the call had ended was my first suspicion. Especially since he and I had discussed what I would be doing after the call to shore up my security (changing email on passwords, accounts, moving documents to external means or other emails, etc), so he would have had knowledge and ample opportunity to possibly see all of this as it happened.

The next day, one email account would allow me to login, but not actually see/open the emails, the other email account would not let me change the password, but would just refresh to the same screen over and over. Closed all out, back in and same occurrence. Desktop background image went about half black.

Remembered part of what he had done while on the phone; removing XProtect from areas that needed its protection was also an indication that he wasn't in the Apple ecosystem.


How can I verify the security of my MacBook after an Apple tech remained remotely logged in?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.