Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Detect spyware and determine who is spying on my imac

I might be paranoid -- but need to know at this point if someone very close to me has installed spyware on my mac. I keep finding forums that say to back up files and just restart your system and wipe everything clean, change passwords, etc. But this won't work for me for a couple of reasons: 1) I really need to know if there is someone close to me who has installed this on my computer and would like to find the IP address that the information is headed to. and 2) the person in question still has access to my computer and almost all of my passwords.


Please can we not get into why I think this person is spying, etc. and if anyone knows anyway for me to detect spyware and determine where information is being sent that would be the most helpful.


Would greatly appreciate any help here as I am paranoid about even looking up these kinds of things of my home computer (which i am doing now) and my iphone. (which I also need help with determining if it has spyware on it).


Thanks very much for any help.

iMac, Mac OS X (10.7.5)

Posted on Mar 24, 2013 5:22 AM

Reply
96 replies

Jul 21, 2017 10:48 PM in response to eljeg

eljeg wrote:


I believe my wifi continues to get compromised, but if you could let me know if you see any red flags, I'd appreciate it.

IdrisSeabright has already given you the correct response, but I'd like to add a couple of things.


Linc no longer participates in this Forum and nobody else is able to interpret his diagnostics well enough to give you a detailed answer. The rule of thumb around here is to read through any discussion that appears to match your circumstances and try any solutions proposed, but if that fails to solve your problem, don't post a "me too". That will almost never give you positive results since hardly anybody will ever see it here, especially in a four plus year old discussion that most are no longer following.


Whoever talked you into installing LogMeIn has a high probability of being the one responsible for the person that is "watching or recording" you. It's fine to use that app with a person you know well and trust, but always remove it after it has served it's purpose. Even if that person didn't somehow learn the password, it can most probably be easily hacked.

Nov 14, 2017 12:27 PM in response to Linc Davis

Hello Linc Davis. Can you please please look at my information below and email me at nowforsale@me.com? Thank you very much!


Last login: Tue Nov 14 14:04:55 on ttys001

ME:~ kextstat -kl | awk '!/com\.apple/{printf "%s %s\n", $6, $7}'

ME:~ sudo launchctl list | sed 1d | awk '!/0x|com\.(apple|openssh|vix)|edu\.mit|org\.(amavis|apache|cups|isc|ntp|postfi x|x)/{print $3}'

Password:

com.adobe.ARMDC.Communicator

com.prey.agent

com.oracle.java.Helper-Tool

com.adobe.fpsaud

com.adobe.ARMDC.SMJobBlessHelper

com.radiosilenceapp.nke.PrivateEye

ME:~ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'

ws.agile.1PasswordAgent

com.openssh.ssh-agent

com.getdropbox.dropbox.2608

unknown

com.adobe.ARMDCHelper.cc24aef4a1b90ed56a725c38014c95072f92651fb65e1bf9c8e43c37a2 3d420d

com.oracle.java.Java-Updater

com.dropbox.DropboxMacUpdate.agent

ME:~ ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null

/Library/Components:


/Library/Extensions:

ACS6x.kext

ATTOCelerityFC8.kext

ATTOExpressSASHBA2.kext

ATTOExpressSASRAID2.kext

ArcMSR.kext

CalDigitHDProDrv.kext

HighPointIOP.kext

HighPointRR.kext

PromiseSTEX.kext

SoftRAID.kext

hp_io_enabler_compound.kext


/Library/Frameworks:

AEProfiling.framework

AERegistration.framework

AudioMixEngine.framework

NyxAudioAnalysis.framework

PluginManager.framework

iTunesLibrary.framework


/Library/Input Methods:


/Library/Internet Plug-Ins:

AdobePDFViewer.plugin

AdobePDFViewerNPAPI.plugin

Disabled Plug-Ins

Flash Player.plugin

JavaAppletPlugin.plugin

Quartz Composer.webplugin

flashplayer.xpt


/Library/Keyboard Layouts:


/Library/LaunchAgents:

com.adobe.ARMDCHelper.cc24aef4a1b90ed56a725c38014c95072f92651fb65e1bf9c8e43c37a2 3d420d.plist

com.apple.iCloudSync.plist

com.oracle.java.Java-Updater.plist


/Library/LaunchDaemons:

com.adobe.ARMDC.Communicator.plist

com.adobe.ARMDC.SMJobBlessHelper.plist

com.adobe.fpsaud.plist

com.oracle.java.Helper-Tool.plist

com.prey.agent.plist

com.radiosilenceapp.nke.PrivateEye.plist


/Library/PreferencePanes:

Flash Player.prefPane

JavaControlPanel.prefPane


/Library/PrivilegedHelperTools:

com.adobe.ARMDC.Communicator

com.adobe.ARMDC.SMJobBlessHelper


/Library/QuickLook:

iBooksAuthor.qlgenerator

iWork.qlgenerator


/Library/QuickTime:

AppleIntermediateCodec.component

AppleMPEG2Codec.component


/Library/ScriptingAdditions:

Script32.osax


/Library/Spotlight:

Microsoft Office.mdimporter

iBooksAuthor.mdimporter

iWork.mdimporter


/Library/StartupItems:


/etc/mach_init.d:


/etc/mach_init_per_login_session.d:


/etc/mach_init_per_user.d:


Library/Fonts:


Library/Input Methods:

.localized


Library/Internet Plug-Ins:


Library/Keyboard:

en-dynamic.lm


Library/Keyboard Layouts:


Library/KeyboardServices:

TextReplacements.db

TextReplacements.db-shm

TextReplacements.db-wal


Library/LanguageModeling:

da-dynamic.lm

de-dynamic.lm

en-dynamic.lm

es-dynamic.lm

fi-dynamic.lm

fr-dynamic.lm

it-dynamic.lm

nb-dynamic.lm

nl-dynamic.lm

pl-dynamic.lm

pt-dynamic.lm

sv-dynamic.lm

tr-dynamic.lm


Library/LaunchAgents:

.DS_Store

com.dropbox.DropboxMacUpdate.agent.plist

ws.agile.1PasswordAgent.plist


Library/PreferencePanes:


Library/Services:

ME:~ $ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null


Dropbox

Nov 14, 2017 12:57 PM in response to Candicemaries123

Candicemaries123 wrote:


Hello Linc Davis. Can you please please look at my information below and email me at nowforsale@me.com? Thank you very much!



Auoting the post immediately above yours by MadMacs0: Linc no longer participates in the Forum. Nobody but Linc understands how to interpret the output of his diagnostics and when he was here he strenuously objected to anybody else who tried, so you did exactly the right thing by starting a new discussion topic as I may be the only other person still monitoring this 4-1/2 year old discussion.

Nov 30, 2017 1:30 AM in response to Linc Davis

I suspect I have monitoring software on my computer: my output is:


com.dropbox.activityprovider

com.dropbox.foldertagger

com.fitbit.galileod

com.adobe.fpsaud

hayleysleodsmbp:~ mcleod$ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'

jp.co.canon.cijscannerregister.8480

com.getdropbox.dropbox.34000

com.arcsoft.Daemon.45264

com.epson.ews.launcher

com.divx.update.agent

com.divx.dms.agent

com.Affinegy.InstaLANa

com.dropbox.DropboxMacUpdate.agent

hayleysleodsmbp:~ mcleod$ ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null

/Library/Components:


/Library/Extensions:

ATTOCelerityFC8.kext

ATTOExpressSASHBA2.kext

ATTOExpressSASRAID2.kext

ArcMSR.kext

CalDigitHDProDrv.kext

EPSONUSBPrintClass.kext

HighPointIOP.kext

HighPointRR.kext

PromiseSTEX.kext

SoftRAID.kext


/Library/Frameworks:

AEProfiling.framework

AERegistration.framework

ArcCon.framework

ArcSocketLib.framework

AudioMixEngine.framework

BaseFunction.framework

Cocoa2Carbon.framework

DivX Toolkit.framework

DivXInstallerUtilities.framework

EWSMac.framework

MagAppFramework.framework

MagCore.framework

MagImgTlsCtrl.framework

MagPCMac.framework

Maglib5.framework

MediaClub.framework

NyxAudioAnalysis.framework

PluginManager.framework

TSLicense.framework

TaskDLL.framework

XSKey.framework

iLifeFaceRecognition.framework

iLifeSQLAccess.framework

iLifeSlideshow.framework

iTunesLibrary.framework


/Library/Input Methods:


/Library/Internet Plug-Ins:

Default Browser.plugin

Disabled Plug-Ins

DivX Web Player.plugin

Flash Player.plugin

Flip4Mac WMV Plugin.plugin

JavaAppletPlugin.plugin

OVSHelper.plugin

Quartz Composer.webplugin

Silverlight.plugin

Unity Web Player.plugin

Unused

VeetleBroadcast-0.9.16

VeetleTVCore-0.9.16

VeetleTVPlayer-0.9.16

flashplayer.xpt

iPhotoPhotocast.plugin

nsIQTScriptablePlugin.xpt

version.txt


/Library/Internet Plug-Ins (Disabled):

Flash Player.plugin


/Library/Keyboard Layouts:


/Library/LaunchAgents:

com.Affinegy.InstaLANa.plist

com.divx.dms.agent.plist

com.divx.update.agent.plist

com.epson.ews.launcher.plist


/Library/LaunchDaemons:

com.adobe.fpsaud.plist

com.apple.aelwriter.plist

com.fitbit.galileod.plist


/Library/PreferencePanes:

Flash Player.prefPane

Flip4Mac WMV.prefPane

Growl.prefPane

Perian.prefPane


/Library/PrivilegedHelperTools:


/Library/QuickLook:

GBQLGenerator.qlgenerator

iBooksAuthor.qlgenerator

iWork.qlgenerator


/Library/QuickTime:

AC3MovieImport.component

AppleIntermediateCodec.component

AppleMPEG2Codec.component

Perian.component


/Library/ScriptingAdditions:


/Library/Spotlight:

GBSpotlightImporter.mdimporter

Microsoft Office.mdimporter

iBooksAuthor.mdimporter

iWork.mdimporter


/Library/StartupItems:

HWNetMgr

HWPortDetect


/etc/mach_init.d:


/etc/mach_init_per_login_session.d:


/etc/mach_init_per_user.d:


Library/Address Book Plug-Ins:

SkypeABCaller.bundle

SkypeABChatter.bundle

SkypeABDialer.bundle

SkypeABSMS.bundle


Library/Fonts:

waltograph42.otf

waltographUI.ttf


Library/Input Methods:

.localized


Library/Keyboard Layouts:


Library/LaunchAgents:

com.apple.CSConfigDotMacCert-hayleymcleod@me.com-SharedServices.Agent.plist

com.dropbox.DropboxMacUpdate.agent.plist


Library/PreferencePanes:


Library/Services:

ENService.app


Library/Spotlight:

EndNote.mdimporter

hayleysleodsmbp:~ mcleod$ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null

Steam, iTunesHelper, Skype, EndNote X2, GrowlHelperApp, Belkin Router Monitor, Fitbit Connect Menubar Helper, Dropbox, Garmin Express Service, ConnectService

Nov 30, 2017 2:46 AM in response to mcleody

As I keep telling everyone, Linc no longer participates in this Forum and nobody else can interpret his diagnostics. And since very few of us are even monitoring this very old discussion, you need to start a new one and instead of posting all that information nobody wants, give us a detailed explanation of what you are seeing and why you believe monitoring software is involved. Better yet, report it to the local authorities and have a trained forensic technician examine your computer.

Mar 24, 2013 5:58 AM in response to neuegirl

for your own sanity - please change your home computers password and then go to apple and change your apple password. http://support.apple.com/kb/HT5624?viewlocale=en_US and make certain remote login is not on

system preferences - sharing - remote login is off.


but what makes you believe this is occurring ? facts ?


there is also a good article on protecting ones self http://www.reedcorner.net/mmg/

but the most important thing is what is happening

Mar 24, 2013 6:19 AM in response to neuegirl

If this is happening, the most likely possibility is that a keylogger needing physical access to the computer has been installed. Get the free demo of MacScan. It's pretty worthless for any other kind of malware, but it does have a relatively good listing of known keyloggers. A keylogger does just what the name suggests; it logs all your keystrokes.


Of course, it may not show up if it's not in their catalog of keyloggers.


http://macscan.securemac.com/


If, a backdoor (an automatic, invisible program set to connect elsewhere) has been installed--and this is doubtful--you might be able to see it happening using Little Snitch, which can check for unauthorized outbound connections. But you'll have a bit of a learning curve in order to use it.


http://www.obdev.at/products/littlesnitch/


Both have free demos.

Mar 24, 2013 6:15 AM in response to neuegirl

the reason for the what is happening question is the fact that by changing your passwords, you may resolve the situation.......but not having an idea of what is making you believe there is spyware eliminates the possibility of giving you a quality answer..... is it text related, email related, facebook related, twitter related, picture related, document related, phone call related... also in the reedcorner you can down load sophos free to scan for issues

but more info is needed

Mar 24, 2013 6:23 AM in response to WZZZ

WZZZ


We may be going out of scope and need a little more information. Allow me to explain, we dont know what the indicators or reasons are. Allow me to explain


EG

One person had reported in the past that some one was monitoring them, it turns out that the person had every password user id combination that the individual used and was pulling info that way.


Another person reported, similiar issue and it turned out to be a friend sharing information with a person.


the question is what is the reason --- facts

Mar 24, 2013 7:05 AM in response to neuegirl

First thing, turn off remote sharing (system preference, sharing, remote sharing). This means you cannot remote access your mac but no one else can either.


You can also install little snitch and watch if some background process is sending packets out to strange IPs. If the person in question has access to the console, then logging could be local and not IP based. Next time you're on the computer, redirect ps -ax to a file "ps -ax > process.txt" just to capture all processes.


You can study that list or ask questions about it. If something is running in the background locally it will be in the process list.

Mar 24, 2013 7:29 AM in response to ssls6

ssls6


the individual has a person who is close to them has access to all userids/passwords and computer

by turning off remote as we both suggested that will take care of one aspect (remote review) but if its

reading text messages, knowing where the person is, emails and things along those lines it maybe self evident to what is occuring. If its social site information (facebook) self evident too. people at times go to extremes without thinking it through macs are pretty secure and if i have every password i can see alot of information (as you would agree, im sure) there are also products along the lines of http://www.webwatcher.com/webwatcher-mac.html which can really mess with some one. but in having no facts, reasons we can through a lot of stuff out here and possibly hurt the person with applications or changes we suggest if they are novices

Mar 24, 2013 7:30 AM in response to neuegirl

Apple does have a service called the Genius Bar. Those folk are Apple employees, and their services are free. They deal with any and all Mac problems. You could take your iMac to a Apple store and have a "genius" look at it. You do have to make an appointment. In my opinion this is the safest way to deal with this problem, safe both for you and for your computer.

Mar 24, 2013 8:45 AM in response to neuegirl

Please read this whole message before doing anything.

This procedure is a diagnostic test. It won’t solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.

Third-party system modifications are a common cause of usability problems. By a “system modification,” I mean software that affects the operation of other software — potentially for the worse. The following procedure will help identify which such modifications you've installed. Don’t be alarmed by the complexity of these instructions — they’re easy to carry out and won’t change anything on your Mac.


These steps are to be taken while booted in “normal” mode, not in safe mode. If you’re now running in safe mode, reboot as usual before continuing.


Below are instructions to enter some UNIX shell commands. The commands are harmless, but they must be entered exactly as given in order to work. If you have doubts about the safety of the procedure suggested here, search this site for other discussions in which it’s been followed without any report of ill effects.


Some of the commands will line-wrap or scroll in your browser, but each one is really just a single line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, and you can then copy it. The headings “Step 1” and so on are not part of the commands.


Note: If you have more than one user account, Step 2 must be taken as an administrator. Ordinarily that would be the user created automatically when you booted the system for the first time. The other steps should be taken as the user who has the problem, if different. Most personal Macs have only one user, and in that case this paragraph doesn’t apply.


Launch the Terminal application in any of the following ways:


☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)


☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.


☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.


When you launch Terminal, a text window will open with a line already in it, ending either in a dollar sign (“$”) or a percent sign (“%”). If you get the percent sign, enter “sh” and press return. You should then get a new line ending in a dollar sign.


Step 1


Triple-click the line of text below to select it:

kextstat -kl | awk '!/com\.apple/{printf "%s %s\n", $6, $7}'

Copy the selected text to the Clipboard by pressing the key combination command-C. Then click anywhere in the Terminal window and paste (command-V). Post the lines of output (if any) that appear below what you just entered. You can do that by copying and pasting as well. Omit the final line ending in “$”. No typing is involved in this step.

Step 2


Repeat with this line:

sudo launchctl list | sed 1d | awk '!/0x|com\.(apple|openssh|vix)|edu\.mit|org\.(amavis|apache|cups|isc|ntp|postfix|x)/{print $3}'

This time you'll be prompted for your login password, which you do have to type. It won't be displayed when you type it. Type it carefully and then press return. You may get a one-time warning to be careful. Heed that warning, but don't post it. If you see a message that your username "is not in the sudoers file," then you're not logged in as an administrator.


Note: If you don’t have a login password, you’ll need to set one before taking this step. If that’s not possible, skip to the next step.


Step 3

launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'

Step 4

ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta}* L*/Fonts 2> /dev/null

Important: If you formerly synchronized with a MobileMe account, your me.com email address may appear in the output of the above command. If so, anonymize it before posting.


Step 5

osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null

Remember, steps 1-5 are all copy-and-paste — no typing, except your password. Also remember to post the output.


You can then quit Terminal.

Detect spyware and determine who is spying on my imac

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.