meltymax

Q: I believe that I have a keylogger or some sort of spyware installed on my mac, please help!

I have many reasons to believe that my ex boyfriend installed a keylogger or spyware on my macbook. I have done a lot of research and cannot find the answers that I am looking for. I have taken a screenshot of my activity monitor in hopes that someone can let me know if anything looks suspicious. It appears fine to me, although I am confidant that I something is installed and being used regularly to snoop and creep my every move on my computer, please help me, any advice would be helpful. As a footnote I have installed macscan and completed a scan and it came up with nothing... I am not being paranoid my ex has basically confirmed my suspicions.

 

 

 

Screen shot 2012-08-26 at 7.33.36 PM.png

MacBook Pro, Mac OS X (10.6.8)

Posted on Aug 26, 2012 6:41 PM

Close

Q: I believe that I have a keylogger or some sort of spyware installed on my mac, please help!

  • All replies
  • Helpful answers

Page 1 of 9 last Next
  • by Linc Davis,Solvedanswer

    Linc Davis Linc Davis Aug 26, 2012 8:05 PM in response to meltymax
    Level 10 (208,037 points)
    Applications
    Aug 26, 2012 8:05 PM in response to meltymax

    Please read this whole message before doing anything.

     

    The following procedure will help whether your system has been modified. Don’t be alarmed by the complexity of these instructions — they’re easy to carry out and won’t change anything on your Mac.

     

    These steps are to be taken while booted in “normal” mode, not in safe mode. If you’re now running in safe mode, reboot as usual before continuing.

     

    Below are instructions to enter some UNIX shell commands. The commands are harmless, but they must be entered exactly as given in order to work. If you have doubts about the safety of the procedure suggested here, search this site for other discussions in which it’s been followed without any report of ill effects.

     

    Some of the commands will line-wrap or scroll in your browser, but each one is really just a single line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, and you can then either copy or drag it. The headings “Step 1” and so on are not part of the commands.

     

    Note: If you have more than one user account, Step 2 must be taken as an administrator. Ordinarily that would be the user created automatically when you booted the system for the first time. The other steps should be taken as the user who has the problem, if different. Most personal Macs have only one user, and in that case this paragraph doesn’t apply.

     

    Launch the Terminal application in any of the following ways:

     

    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)

     

    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.

     

    ☞ Open LaunchPad. Click Utilities, then Terminal in the page that opens.

     

    When you launch Terminal, a text window will open with a line already in it, ending either in a dollar sign (“$”) or a percent sign (“%”). If you get the percent sign, enter “sh” and press return. You should then get a new line ending in a dollar sign.

     

    Step 1

     

    Copy or drag — do not type — the line below into the Terminal window, then press return:

     

    kextstat -kl | awk '!/com\.apple/{printf "%s %s\n", $6, $7}'
    
    

     

    Post the lines of output (if any) that appear below what you just entered (the text, please, not a screenshot.) You can omit the final line ending in “$”.

     

    Step 2

     

    Repeat with this line:

     

    sudo launchctl list | sed 1d | awk '!/0x|com\.(apple|openssh|vix)|edu\.mit|org\.(amavis|apache|cups|isc|ntp|postfix|x)/{print $3}'
    
    

     

    This time, you'll be prompted for your login password, which won't be displayed when you type it. You may get a one-time warning not to screw up. You don't need to post the warning.

     

    Note: If you don’t have a login password, you’ll need to set one before taking this step. If that’s not possible, skip to the next step.

     

    Step 3

     

    launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'
    
    

     

    Step 4

     

    ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta}* L*/Fonts 2> /dev/null
    
    

     

    Important: If you formerly synchronized with a MobileMe account, your me.com email address may appear in the output of the above command. If so, anonymize it before posting.

     

    Step 5

     

    osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null
    
    

     

    Remember, steps 1-5 are all drag-and-drop or copy-and-paste, whichever you prefer — no typing, except your password. Also remember to post the output.

     

    You can then quit Terminal.

  • by rrahimi,

    rrahimi rrahimi Aug 26, 2012 8:16 PM in response to meltymax
    Level 3 (615 points)
    Aug 26, 2012 8:16 PM in response to meltymax

    If you end up discovering something, you should inform law enforcement and contact your lawyer. Any form of Wiretapping without consent is a crime and in some jurisdictions can carry very long sentences.

     

    Also, use a different safe computer to reset:

     

    - Your online banking and other financial information passwords, security questions/answers, etc.

    - Your email passwords and security information

    - Other similar senstitive information that might have been compromised

  • by meltymax,

    meltymax meltymax Aug 26, 2012 8:21 PM in response to Linc Davis
    Level 1 (2 points)
    Aug 26, 2012 8:21 PM in response to Linc Davis

    That is great information and great step by step instructions thank you, although can you explain what this is doing? If I complete those steps will I know if I had spyware or keyloggers on my mac? What exactly is this process doing? My apologies I am a day to day user,  and not very skilled with all of the background stuff that makes the computer run... I appreciate your response. Thank you.

  • by meltymax,

    meltymax meltymax Aug 26, 2012 9:47 PM in response to Linc Davis
    Level 1 (2 points)
    Aug 26, 2012 9:47 PM in response to Linc Davis

    Output after step 1:

    com.spsys.driver.ENKEDriver (1)

    com.spsys.driver.EIOKitDriver (1.0.1)

     

    Output after step 2:

    com.spsecure.edaemon

    com.sierrawireless.SWoCTool

     

    Output after step 3:

    com.spsecure.euseragent

     

    Output after step 4:

    /Library/Components:

     

     

    /Library/Extensions:

     

     

    /Library/Frameworks:

    EWSMac.framework

    NyxAudioAnalysis.framework

    PluginManager.framework

    iLifeFaceRecognition.framework

    iLifeKit.framework

    iLifePageLayout.framework

    iLifeSQLAccess.framework

    iLifeSlideshow.framework

     

     

    /Library/Input Methods:

     

     

    /Library/Internet Plug-Ins:

    EPPEX Plugin.plugin

    Flash Player.plugin

    JavaAppletPlugin.plugin

    Quartz Composer.webplugin

    QuickTime Plugin.plugin

    Silverlight.plugin

    flashplayer.xpt

    iPhotoPhotocast.plugin

    nsIQTScriptablePlugin.xpt

     

     

    /Library/Keyboard Layouts:

     

     

    /Library/LaunchAgents:

    com.spsecure.euseragent.plist

     

     

    /Library/LaunchDaemons:

    com.apple.third_party_32b_kext_logger.plist

    com.sierrawireless.SWoCTool.plist

    com.spsecure.edaemon.plist

     

     

    /Library/PreferencePanes:

    Flash Player.prefPane

     

     

    /Library/PrivilegedHelperTools:

     

     

    /Library/QuickLook:

    GBQLGenerator.qlgenerator

    iWork.qlgenerator

     

     

    /Library/QuickTime:

    AppleIntermediateCodec.component

    AppleMPEG2Codec.component

     

     

    /Library/Spotlight:

    AppleWorks.mdimporter

    GBSpotlightImporter.mdimporter

    LogicPro.mdimporter

    Microsoft Office.mdimporter

    iWork.mdimporter

     

     

    /Library/StartupItems:

     

     

    /etc/mach_init.d:

    dashboardadvisoryd.plist

     

     

    /etc/mach_init_per_login_session.d:

     

     

    /etc/mach_init_per_user.d:

     

     

    Library/Address Book Plug-Ins:

     

     

    Library/Fonts:

     

     

    Library/Input Methods:

    .localized

     

     

    Library/Internet Plug-Ins:

     

     

    Library/Keyboard Layouts:

     

     

    Library/LaunchAgents:

    -SharedServices.Agent.plist

    jp.co.canon.Inkjet_Extended_Survey_Agent.plist

     

     

     

    Library/PreferencePanes:

     

    Output after step 5:

    iTunesHelper, 3G Watcher

     

     

    That is all of the output that I received. Hopefully there is some useful information here?

     

    <E-mail Edited by Host>

  • by rrahimi,Helpful

    rrahimi rrahimi Jul 30, 2016 2:13 PM in response to meltymax
    Level 3 (615 points)
    Jul 30, 2016 2:13 PM in response to meltymax

    I'll chip in. From your results:

     

    /Library/LaunchAgents:

    com.spsecure.euseragent.plist

    It's Spector Pro, monitoring software:

     

    <Link Edited by Host>

  • by clintonfrombirmingham,

    clintonfrombirmingham clintonfrombirmingham Aug 26, 2012 8:57 PM in response to rrahimi
    Level 7 (30,009 points)
    Mac OS X
    Aug 26, 2012 8:57 PM in response to rrahimi

    There should be a law banning software like that - I'm sure that they fly under the parental control radar, but still...

     

    Good find - I hope that the OP doesn't have to buy the software to uninstall it.

     

    Clinton

  • by meltymax,

    meltymax meltymax Aug 26, 2012 8:58 PM in response to rrahimi
    Level 1 (2 points)
    Aug 26, 2012 8:58 PM in response to rrahimi

    Wow, ok thank you very much. Any ideas how to get rid of it?

  • by Linc Davis,

    Linc Davis Linc Davis Aug 26, 2012 9:07 PM in response to meltymax
    Level 10 (208,037 points)
    Applications
    Aug 26, 2012 9:07 PM in response to meltymax

    Don't get rid of it at all until you have consulted a lawyer and/or informed the police. Your computer may be evidence of a crime or an actionable wrong.

     

    When the time comes to remove it, you'll do so by backing up your data, erasing the boot volume, and restoring only your documents and settings. All your third-party software will have to be reinstalled from fresh copies.

  • by rrahimi,Helpful

    rrahimi rrahimi Aug 26, 2012 9:07 PM in response to meltymax
    Level 3 (615 points)
    Aug 26, 2012 9:07 PM in response to meltymax

    I would say deleting the .plist file to at least prevent the agent from running but I suspect it will recreate it. I don't have experience with Keylogging software on Mac but on Windows they can be extremely hard to remove.

     

    Since you are a regular user and not very technically savvy, I would recommend backing up your photos, videos, documents and other things you require and then wiping the disk clean and reinstalling OS X.

     

    You don't know what other malicious software is installed on this machine. Better have a clean one.

     

    Important Edit: As Linc says, Lawyer up!

     

    Most important edit: I hope you're not doing all of this typing on the same machine.

  • by rrahimi,

    rrahimi rrahimi Aug 26, 2012 9:09 PM in response to clintonfrombirmingham
    Level 3 (615 points)
    Aug 26, 2012 9:09 PM in response to clintonfrombirmingham

    Yeah, as usual these things can be used for good or bad.

     

    Parents, Security sensitive corporate environments, Gov agencies, Law enforcement...

     

    If the guy is caught he's gonna be in loads of trouble. He probably bought this on Credit Card so should be pretty **** easy to trace back.

  • by clintonfrombirmingham,

    clintonfrombirmingham clintonfrombirmingham Aug 26, 2012 9:11 PM in response to rrahimi
    Level 7 (30,009 points)
    Mac OS X
    Aug 26, 2012 9:11 PM in response to rrahimi

    Linc offered some good advice - I would call the police immediately. They should be able to make a case against the jerk. I'd go to the police first -- even before contacting a lawyer.

     

    Clinton

  • by meltymax,

    meltymax meltymax Aug 26, 2012 9:25 PM in response to clintonfrombirmingham
    Level 1 (2 points)
    Aug 26, 2012 9:25 PM in response to clintonfrombirmingham

    Thank you guys for your expertise. I am relieved that I know for certain now. All of your help has been great.

  • by meltymax,

    meltymax meltymax Aug 28, 2012 7:22 AM in response to meltymax
    Level 1 (2 points)
    Aug 28, 2012 7:22 AM in response to meltymax

    Hey guys,

    I have been in contact with Spector, and they have assured me that the eblaster software has now been disabled. They were unable to disclose any information about the person who installed it, in which I am confidant I know, although would like solid evidance. They informed me they need a court-order to disclose that information. I was wondering if any of you knew any code as provided by Linc to type into the terminal in which would provide me with the email address that was used to send the eblaster reports to? This may be a shot in the dark, although worth asking. Thank you again for your help previously, I finally have a piece of mind.

     

    Thank you.

  • by Linc Davis,

    Linc Davis Linc Davis Aug 28, 2012 7:33 AM in response to meltymax
    Level 10 (208,037 points)
    Applications
    Aug 28, 2012 7:33 AM in response to meltymax

    That should be determined by a qualified forensic investigator, not by random strangers on a public message board. This is a serious matter.

Page 1 of 9 last Next