Want to highlight a helpful answer? Upvote!

Did someone help you, or did an answer or User Tip resolve your issue? Upvote by selecting the upvote arrow. Your feedback helps others! Learn more about when to upvote >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Trojan BackDoor.Wirenet.2

Help me please! My macbook pro late 2013 has infected trojan (BackDoor.Wirenet.2). How to remove it.

MacBook Pro with Retina display, OS X Mavericks (10.9.1)

Posted on Feb 6, 2014 11:00 AM

Reply
26 replies

Feb 15, 2014 1:25 AM in response to Linc Davis

I was recently reviewing your comments. I was told my MacBook Pro was compromised by a colleague, using brute force to enter a backdor allowing rootkit access and administraion rights. I believe if I use the time machine backup files I will end up having these rights reinstated when uploading the backup.

But First, I would like your opinion concerning the following information collected, and what course of action I should proceed with for removing and securing in the event there is substantial imformation from MacBook Pro LOG following my comments.


Thank you for any support



Boot Mode: Normal



USB



Hub (SMSC)

Hub (SMSC)



System diagnostics



Preview 2014-01-28-003447 hang

SecurityAgent 2014-01-30-141803 crash

SecurityAgent 2014-01-30-141811 crash

SecurityAgent 2014-01-30-141949 crash

SecurityAgent 2014-01-30-142226 crash

SecurityAgent 2014-01-30-142411 crash

SecurityAgent 2014-01-30-142519 crash



User diagnostics



cider 2014-01-26-234202 crash



Extrinsic system jobs



com.microsoft.office.licensing.helper



launchd items



/Library/LaunchDaemons/com.microsoft.office.licensing.helper.plist

(com.microsoft.office.licensing.helper)

Library/LaunchAgents/com.apple.FolderActions.enabled.plist

(com.apple.FolderActions.enabled)

Library/LaunchAgents/com.apple.FolderActions.folders.plist

(com.apple.FolderActions.folders)



Extrinsic loadable bundles



/System/Library/Extensions/HuaweiDataCardDriver.kext

(com.huawei.driver.HuaweiDataCardDriver)

/Library/Internet Plug-Ins/Flash Player.plugin

(com.macromedia.Flash Player.plugin)

/Library/Internet Plug-Ins/SharePointBrowserPlugin.plugin

(com.microsoft.sharepoint.browserplugin)

/Library/Internet Plug-Ins/SharePointWebKitPlugin.webplugin

(com.microsoft.sharepoint.webkitplugin)

/Library/PreferencePanes/Flash Player.prefPane

(com.adobe.flashplayerpreferences)

/Library/Spotlight/LogicPro.mdimporter

(No bundle ID)



Unsigned shared libraries



/usr/lib/bkLib.dylib

/usr/lib/lib6200Lib.dylib

/usr/lib/lib6246Lib.dylib

/usr/lib/lib6270Lib.dylib

/usr/lib/lib7225lib.dylib

/usr/lib/lib8200Alib.dylib

/usr/lib/lib8200lib.dylib

/usr/lib/lib8220lib.dylib

/usr/lib/libAgent.dylib

/usr/lib/libcurl.zte.dylib

/usr/lib/libIceraDownloadLib.dylib

/usr/lib/libmd5.dylib

/usr/lib/libTinyXml.dylib



Restricted user files: 317



Font problems: 40



Elapsed time (s): 213

Feb 15, 2014 2:47 AM in response to nikdgr

nikdgr wrote:


I was told my MacBook Pro was compromised by a colleague, using brute force to enter a backdor allowing rootkit access and administraion rights.

Linc will probably be along shortly (although he doesn't always respond to "me too" requests), but I for one would like to know a lot more about how this was accomplished.


By brute force do you mean someone had physical access to your computer and installed this backdoor? That's normally the only way that sort of thing can happen unless your software is way out-of-date or something new is lurking about. And I'm assuming you meant "root" access, since rootkits are malware attacks. It would be helpful if your colleague could provide specific details on how this was accomplished and any malware found on your computer.


It also sounds like a law or two was broken here and you should be contacting appropriate authorities to both find the perpetrator and determine what information has been compromised, before you attempt anything such as restoration from backup.

Feb 15, 2014 4:09 AM in response to nikdgr

I was told my MacBook Pro was compromised by a colleague


I would strongly recommend you start your own topic, since it's very unlikely that the Wirenet malware is involved in your case.


One thing I will say here, though, is that if a colleague has had physical access to your machine, and if you have good reason to believe that this colleague has done something malicious to your computer, there is only one reasonable solution: erase the hard drive and reinstall everything from scratch. There is no reliable method for detecting and removing whatever your colleague might have done, especially since it may not have involved any kind of malware at all, but just reconfiguration of built-in system components or already installed third-party software.

Trojan BackDoor.Wirenet.2

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.