Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

How to remove rootkits and malware?

I have downloaded and ran the programme Rootkit Hunter and the results are worrying.

I don't know much about malware other than a malicious individual has persistently been installing it onto my machines via malicious emails - this time targeting my iPhone 4 (which I promptly got rid of upon discovering this individual's presence and replaced with a new Samsung S4, which is probably infected as well now) first; and from there using my house Wifi network to get onto my Macbook Pro 10.8.3 (which is the machine I am on now, and the machine the results refer to); and also my Samsung Galaxy Tab 10.1; and most likely the phones and computers belonging to other members of my family are compromised as well.

The following are the worrying results identified by Rootkit Hunter:

For "Checking LD_LIBRARY_PATH variable", it says in yellow "skipped".

For "Checking for hidden processes", it also says in yellow "skipped".

I also have red warning notices in relation to system configuration file checks and filesystem checks alerting me to the following:

"Checking if SSH protocol v1 in allowed The SSH configuration option 'Protocol' has not been set";

"Checking if syslog remote logging is allowed Syslog configuration file allows remote logging: install.* .0.1:32376"

"Checking /dev for suspicious file types Suspicious file types found in /dev: /dev/fd/6: MS Windows icon resource"

"Checking for hidden files and directories Hidden file found: /usr/share/man/man5/. rhosts.5: troff or preprocessor input text".

I do not know how to interpret these results other than of course realising they are alerting me to the fact that something is wrong and needs fixing.

I do not know exactly what Rootkit Hunter is telling me is wrong, and I do not know how to fix the problems it has identified.

I would greatly appreciate it if anybody could perhaps tell me how I can do these things. And any advice on which programmes to use for my Samsung machines and the best way to protect my devices in the future would also be greatly appreciated.

Posted on Aug 23, 2013 11:05 AM

Reply
Question marked as Best reply

Posted on Nov 13, 2017 6:00 AM

Hi mate, I know it’s been a few years since you posted about this issue and at the time I would not have believed that what you were experiencing was anything like what you were describing. I understand how frustrating it is to have people tell you that something isn’t possible, when it’s obvious to you that it is. I found your post because a similar Trojan has infected nearly all of the devices on my network also. It has similar functionalities to what you have described and I’m about ready to give up and just deal with it.

I have five macs, an iPad, two iPhones, an Apple TV and a technicolor gateway/router which are all infected. Two of the macs had boot camp installs of windows which were also infected and all the devices are compromised at the NVRAM / SMC / EFI and system partition levels. On the macs it works by changing the boot order of the drivers in the NVRAM parameters so that the Bluetooth driver loads first, it loads an infected blued.plist file which launches all the processes required to take control of your system before it even gets to load the USB drivers required to accept any input from your keyboard. So, no key combinations for SMC reset or NVRAM reset, or alternate boot device menu, or single user mode boot can intervene. Remove all the drives from the machine and make the blued.plist file inaccessible and instead it will attempt to NetBoot the infection from any attached devices, including a time capsule and even a thunderbolt adapter if it contains an option ROM, failing that it will got for a remote server and if there’s no internet connection it displays the ‘Internet Recovery’ screen and asks you to connect to a wifi network. Internet recovery appears to be running as normal, but actually the boot loader just redownloaded the infection from a remote server, created a ram drive with some bootable Linux based UEFI parent/controller and then runs the recovery mode below that, infecting the OS installer as it downloads from the secure apple server.


Back to square one.


I haven’t even begun to figure out how it works on iOS yet but I assure you it has infected those devices in a similar way.


I believe i was infected because of a JavaScript/sandbox vulnerability. I think I entered my Apple ID info into a malicious password prompt pop up which looked identical to what a real one did at the time (iOS 10.2). Now iOS and OS X both operate as if they have been sandboxed, with processes invisible to activity monitor but not to a root level terminal shell. It creates TCP connections to the remote control centre which aren’t easily detected because it compromises existing system processes like airplay, screen sharing, spotlight etc. It intercepts the dns requestes of all the antivirus software updaters that I’ve tried so far, and either downloads fake definitions files or modifies the applications to skip the infected files like you mentioned. Malware bytes, little snitch, blockblock, kaspersky, norton, Sophos, intego, the App Store updates and iTunes all get intercepted and redirected to alternate download servers. NetBarrier by intego is the only software that seems to actually still operate correctly and prompt when a connection attempt is made, it shows the address of the server that the app attempted to contact and they’re usually amazon hosted cloud storage or some real looking address like updserv.live.norton.com but with a .aksdns.net at the end of it. None of the addresses ever resolve to a server in safari because if you attempt to connect without presenting the software’s built in encryption key then it just silently drops your request and resolves to a 404 error.


I could give you another 2000 words on other behaviours I have discovered but I think you get the point. Basically the main ones are; keys are logged, passwords are captured, time machine backups are infected, any and all drives that are connected to an infected system are immediately repartitioned with a hidden 60mb EFI boot volume so as to infect any other devices it may be connected to during a reboot, RPCs for hidden screen sharing connections appear in Console and most deceiving and destructive of all, wifi and Bluetooth are both active even when OS X shows them as disabled and even when the network device is completely removed from the network pane of system config.


My next option is to attempt a physical hardware flash of the NVRAM to a clean factory state followed by an internet recovery from an alternate internet connection or with a new modem (the technicolor gateway is a SOC device running FreeBSD so it was infected also).


Anyways, my point is, I believe you, it’s possible now and the vault 7 leaks show that it was possible in 2013 as well. I’m sorry that you had to go through it, I feel your pain and I hope you’ve upgraded devices since then and managed to keep them from becoming infected also. Apple says that it’s beyond the scope of their engineering department and that I would need to consult a cyber security specialist in order to remove it. If I don’t figure it out soon I will be returning my six week old iMac and asking for a new one.


Wish me luck!

68 replies

Sep 5, 2013 8:02 PM in response to Minty18522

Sorry, I must have misinterpreted what you said; I had the impression that your families were acquainted. You still have the option of warning her off with a "cease and desist unless you'd like the embarassment of a police visit".


And yes, it does sound like you meet the wrong kind of women. I can't say I've noticed any general inclinations of this sort among women in general...

And I am shocked myself that you use phases like "world-class hacking", when literally anybody can download software which enables them to install keyloggers and remotely spy on people.

But not automatically and without any action on the part of the computer's owner. Not even on modern versions of Windows 8 (unless poorly configured). And not on any up to date version of OS X, iOS, most Unix versions and many Linux versions (again, only ones with poor default configurations). Further, while Windows might be poorly configured out of the box, the default configuration for OS X is pretty secure.


In any case, good luck.

Sep 5, 2013 8:10 PM in response to g_wolfman

"You still have the option of warning her off with a "cease and desist unless you'd like the embarassment of a police visit".


Tried that - she doesn't think I would do it.


Same with my previous cyberstalker who has cyberstalked me for tears - threats and warnings don't phase her. But then again, she doen't have much to lose from a visit from the police - menial job, and I reckon she has at least one personality disorder like BPD or Aspergers or something, judging by the amount of times I have warned her to leave me alone and the way she just completely disgegards them and continues.


This other girl is a different kettle of fish however - a visit from the police to her door would cause both her and her parents serious embarassment.

Sep 5, 2013 8:19 PM in response to Minty18522

No doubt. And how much of her behaviour (with people in general, not even just you) is enabled by everyone around her being too genteel to want to cause her aprents any embarassment?


I'm a Professional Engineer (a Chartered Engineer, as I'm guessing you're in the UK). Both my wife and I are well-educated professionals. I can tell you that if this were my daughter, I'd want the embarassing police visit. And my daughter, Cambridge educated twenty-something or not, would be having a very unpleasant day afterwards.


But then again, I'm Canadian; maybe I'm just not that refined. You're the one that has to deal with your particular situation and the consequences of whatever choices you make.


Again, good luck.

Sep 5, 2013 10:44 PM in response to Minty18522

Minty18522 wrote:


Are you totally sure that just opening the emails won't give any malware access to my machines?

On a Mac or iPhone, I am totally sure. It seems reasonable to me that if someone were to spend a great deal of time and money they could write a complex javascript that would be rendered by a Mail client or webmail browser and interact with OS X API's to do something. There have certainly been such attacks on the Windows side of the house (perhaps Android and RIM, but I don't track those). But to date there have not been any reports of even a proof-of-concept malformed javascript for e-mail. There are currently 285 JS (javascript) malware definitions in the ClamAV® database and none show as OSX. I'm sure the majority of those are for websites, but there are a couple that could be mail related.

Sep 5, 2013 11:45 PM in response to MadMacs0

Yes I did: two passwords actually - the firmwire one as well.


The, what I think, contiminated emails were lying open in my inbox for sometime - ClamXav usually flags those up, so they can't be totally harmless.


I did not have my firewall on stealth mode though - somerhing I have adjusted it to now.


The individual in question doesn't let me know if I have had any success in removing the stuff - she would prefer it to leave me tearing my hair out trying to look for things that aren't even there, rather than actually tell me my machines are clean.


I have just switched my Firewall on Stealth Mode; hopefully this will help.


I have no idea though what to do with my Android devices.

Sep 6, 2013 12:06 AM in response to Minty18522

Minty18522 wrote:


The, what I think, contiminated emails were lying open in my inbox for sometime - ClamXav usually flags those up, so they can't be totally harmless.

Yes, most often they are exactly harmless. Without knowing the infection names, I can't really tell you, but most of the ones we see are either possible phishing attempts where you would have to click a link and enter privacy information to cause any harm or Windows malware attachments. There are only a couple that are attachments which take advantage of a Microsoft Word 2004 / 2008 for Mac vulnerability that was patched several years ago. Those are being targeted against some very small groups (e.g. Tibetan sympathizers). [I spend a good part of my time doing uncompensated tech support in the ClamXav Forum.]

Sep 6, 2013 3:22 AM in response to Minty18522

You say remotely installing malware, like keyloggers and rootkits is difficult.


But I have actually had another girl who did this as well in the past


No, I'm sure that was probably another case of someone using your online accounts to make you believe she has access to more than she really does. There's just no chance that two different girls of the nature you have described could have done a little Googling and figured out how to do what you say they did.


If you don't believe me, let me ask you this: are you as smart as these two girls? I would guess so, from the way you have characterized them. In that case, give it a try yourself. See if you can figure out a way to do this, and try to actually do it. (To yourself, mind you... you really don't want to tread in federal crime territory by doing this to someone else.)


I will guarantee you that you won't be able to do so, at least not on Mac OS X or iOS. (With Android and older versions of Windows, I would make no such guarantees.)


Are you totally sure that just opening the emails won't give any malware access to my machines? Because I have seen forums where wannabe hackers have requested advice on how to remotely put spyware on people's machines via just emails without links and attachments


I am absolutely, 100% sure. It's always possible such a vulnerability could be discovered at some point in the future, but if one is known right now, it's known only in the darkest, most secretive corners of the hacking underworld, where professional security researchers haven't found signs of it.


Keep in mind, these are "wannabe" hackers you're talking about here. There are countless numbers of what the security community refers to as "script kiddies" out there who like to run their mouths and make wild claims of what they are able to do.


But in my experience, it is silly little girls who sit doing this kind of thing - perhaps not on multiple devices like you say, but certainly on just one at a time; and that it doesn't seem particularly difficult.


Again, if it's so easy that "silly little girls" can do this, try it for yourself. And keep in mind that there's an entire white hat hacker community out there, full of very knowledgeable and experience people, who devote large amounts of time to finding and drawing attention to vulnerabilities that allow this sort of thing. Many companies these days even pay out "bug bounties" to people who report major vulnerabilities directly to them. There are also those in the hacker community who would love nothing more than to give Apple a black eye by publicly reporting such a vulnerability. If these people can't find such vulnerabilities, what sense does it make to assume two "silly girls" can spend an hour or two on Google and figure it out?

Sep 6, 2013 4:39 AM in response to MadMacs0

Are you totally sure that just opening the emails won't give any malware access to my machines?

"On a Mac or iPhone, I am totally sure."


But the question remains how did they get such unfettered access to them then?


Stalker number 1 has been sending me malicious phishing emails for years and has contaminated many a machine I own; then when I get a new one the emails increase in frequency and style, suggesting she is desperately trying to re-establish herself on my property again.


And when I was reading not so long agao about things to put in terminal comand to check for hidden processes and reading about different ways to erase and recover the drive, the person was shutting my machine down on me and removing the Safari ad Firefox icons when I got back online in an effort to stop me reading further.


My passwords are strong and none of these two individials live locally. And THEY DO have access to everything I have mentioned. I am 100% sure, as they always reveal they do to me to try and annoy me further.


So if they can't do it via a malicious email - which on every other forum other than this one is cited as the number one way people remotely install malicious spyware onto other people's machines - then how?

Sep 6, 2013 5:05 AM in response to Minty18522

At this point, everything you have provided details about boils down to either something that could be accessed trivially by someone having access to one of your online accounts or glitches on the computer (crashing apps and disappearing icons). Nothing you have mentioned shows any indication that all your devices have been hacked.


Unfortunately, I can't think of anything more I can say to sway you to my point of view. So, I think at this point I'll sign off. My last recommendation: I strongly recommend trying to do some of these things yourself and see how far you get. After all, if a couple "silly girls" an do it, shouldn't you be able to?

Sep 6, 2013 5:13 AM in response to thomas_r.

Yes, but I am loathe to sit spending my time researching about something I have no interest in because of the actions of somebody else.


Anyway thinks for all your help. I have just skim read all these responses, and even missed some althogether, as I have been a bit busy.


I will read them all over more carefully later and properly consider everyhting that has been said.


If these two really don't have the ability to do what I thought, or what they deliberately led me to think, they did, then that is great news.


Many thanks to all here for all the advice.

Sep 6, 2013 7:00 AM in response to Minty18522

In reality of course, there is no such thing as total internet privacy: US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails:


http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

Sep 7, 2013 5:06 AM in response to Klaus1

I have just re-read all the helpful coments and advice on this thread and would just like to say that all accounts I use consist of email accounts only.


I do not use iCloud or download anything from the Apple Store. However I do download apps from the Google Play store - which I use my Gmail account to do.


So I have a number of email accounts, all of which I have now changed the password for (including the Gmail one mentioned above, which was annoying, because I now have to pay for a fresh set of apps and I lose all the progress I had made on games I downloaded from Google Play).


If the person is/was not accessing my machines via these email accounts, then could someone who knows what they are talking about please confirm to me that if they can't access my machines through these email accounts, then they can't access my computers and phones at all?


And I own an external hard drive with a lot of valuable stuff on it. Should I be worried that anything nasty could have wormed its way onto that? I had plugged it into my infected machine before I took it to the store.


Once again, thanks in advance to anyone who repliesl

How to remove rootkits and malware?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.