Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

New Terminal Results 4 Spyware / Keylogger Detection Review

For Linc and all knowledgeable,


My MBPro webcam was taken over a few months ago and video was recorded of me without my knowledge. At the time I thought it was taken over from a website and was unaware of the potential of spyware that could be installed on my local harddrive. In just the last week I have reason to believe that there maybe a keylogger on my machine recording my writing in MS Word and otherwise. All of this is part of a greater and very serious stalking/harassment/surveilence threat I'm having to face down... So I'm in the process of overhauling my entire internet/Mac security set-up. I am thankful I'm on a Mac at least...


I followed the terminal scripts that Linc posted and here is the output I got.


Thanks to Linc and all who can respond with constructive help!


Step 1


  1. com.microsoft.driver.MicrosoftMouse (8.2)
  2. com.microsoft.driver.MicrosoftMouseUSB (8.2)
  3. com.avg.Antivirus.OnAccess.kext (14.0)



Step 2


  1. com.zeobit.MacKeeper.plugin.AntiTheft.daemon
  2. com.raynersw.nshctldo
  3. com.microsoft.office.licensing.helper
  4. com.avg.Antivirus
  5. com.avg.Antivirus.infosd
  6. com.adobe.SwitchBoard
  7. com.adobe.fpsaud



Step 3


  1. com.zeobit.MacKeeper.plugin.AntiTheft.daemon
  2. com.raynersw.nshctldo
  3. com.microsoft.office.licensing.helper
  4. com.avg.Antivirus
  5. com.avg.Antivirus.infosd
  6. com.adobe.SwitchBoard
  7. com.adobe.fpsaud

new-host:~ MacBookPro$ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'

  1. com.extensis.FMCore
  2. com.avg.Antivirus
  3. com.adobe.CS5ServiceManager
  4. com.adobe.CS4ServiceManager
  5. com.adobe.AdobeCreativeCloud
  6. com.zeobit.MacKeeper.Helper
  7. com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae
  8. com.adobe.AAM.Scheduler-1.0



Step 4


/Library/Components:


/Library/Extensions:


/Library/Frameworks:

  1. AEProfiling.framework
  2. AERegistration.framework

Adobe AIR.framework

  1. AudioMixEngine.framework
  2. EWSMac.framework
  3. ExtensisPlugins.framework
  4. NyxAudioAnalysis.framework
  5. PluginManager.framework
  6. TSLicense.framework
  7. iTunesLibrary.framework


/Library/Input Methods:


/Library/Internet Plug-Ins:

  1. AdobeAAMDetect.plugin
  2. AdobeExManDetect.plugin
  3. AdobePDFViewer.plugin
  4. AdobePDFViewerNPAPI.plugin

Flash Player.plugin

Flip4Mac WMV Plugin.plugin

JavaAppletPlugin.plugin

Quartz Composer.webplugin

QuickTime Plugin.plugin

  1. SharePointBrowserPlugin.plugin
  2. SharePointWebKitPlugin.webplugin
  3. Silverlight.plugin
  4. SurveillanceClient.plugin
  5. flashplayer.xpt
  6. iPhotoPhotocast.plugin
  7. npContributeMac.bundle
  8. nsIQTScriptablePlugin.xpt


/Library/Keyboard Layouts:


/Library/LaunchAgents:

  1. com.adobe.AAM.Updater-1.0.plist
  2. com.adobe.AdobeCreativeCloud.plist
  3. com.adobe.CS4ServiceManager.plist
  4. com.adobe.CS5ServiceManager.plist
  5. com.avg.Antivirus.gui.plist
  6. com.extensis.FMCore.plist


/Library/LaunchDaemons:

  1. com.adobe.SwitchBoard.plist
  2. com.adobe.fpsaud.plist
  3. com.avg.Antivirus.infosd.plist
  4. com.avg.Antivirus.services.plist
  5. com.microsoft.office.licensing.helper.plist
  6. com.raynersw.nshctldo.plist
  7. com.zeobit.MacKeeper.plugin.AntiTheft.daemon.plist


/Library/PreferencePanes:

Flash Player.prefPane

Flip4Mac WMV.prefPane

Microsoft Mouse.prefPane


/Library/PrivilegedHelperTools:

  1. com.microsoft.office.licensing.helper
  2. com.raynersw.nshctldo


/Library/QuickLook:

  1. GBQLGenerator.qlgenerator
  2. iBooksAuthor.qlgenerator
  3. iWork.qlgenerator


/Library/QuickTime:

AppleIntermediateCodec.component

AppleMPEG2Codec.component

Flip4Mac WMV Advanced.component

Flip4Mac WMV Export.component

Flip4Mac WMV Import.component

SoundboothScoreCodec.component


/Library/ScriptingAdditions:

Adobe Unit Types.osax


/Library/Spotlight:

GBSpotlightImporter.mdimporter

Microsoft Office.mdimporter

  1. iBooksAuthor.mdimporter
  2. iWork.mdimporter


/Library/StartupItems:


/etc/mach_init.d:


/etc/mach_init_per_login_session.d:


/etc/mach_init_per_user.d:

com.adobe.SwitchBoard.monitor.plist


Library/Extensis:

Suitcase Fusion

com.extensis.FMCore-LaunchInfo.conf


Library/Fonts:


Library/Frameworks:

EWSMac.framework


Library/Input Methods:

.localized


Library/Internet Plug-Ins:

EMusic.plugin

RealPlayer Plugin.plugin


Library/Keyboard Layouts:


Library/LaunchAgents:

  1. com.adobe.AAM.Updater-1.0.plist
  2. com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist
  3. com.zeobit.MacKeeper.Helper.plist


Library/PreferencePanes:



Step 5


iTunesHelper

Posted on Jun 28, 2014 12:57 PM

Reply
49 replies

Jun 30, 2014 12:23 PM in response to MadMacs0

That is my concern I never changed my email accounts to be associated with the Notes App... I just opened my Mail App 2 days ago and all of my connections but one were not connecting. So I opened the Mail Accounts pane within the Sys Prefs dialog and found that my mail accounts had been dissassociated withmy Mail App and reassociated with the Notes App. I did not make this change. It got changed on its own somehow or potentially through malware of some sort...

Jun 30, 2014 12:30 PM in response to morning sun

morning sun wrote:


That is my concern I never changed my email accounts to be associated with the Notes App... I just opened my Mail App 2 days ago and all of my connections but one were not connecting. So I opened the Mail Accounts pane within the Sys Prefs dialog and found that my mail accounts had been dissassociated withmy Mail App and reassociated with the Notes App. I did not make this change. It got changed on its own somehow or potentially through malware of some sort...

Well you are only showing me your Notes which is not an email account and would normally only be associated with the Notes app. I can't see any of your Mail accounts so I can't comment on them.

Jun 30, 2014 12:55 PM in response to MadMacs0

"you are only showing me your Notes which is not an email account and would normally only be associated with the Notes app"


Yes this is my Mail Account configuration dialog box. This dialog box should have nothing to do with the Notes App. This dialog box is intended to be used to set up an email account to be used with the Mail App.


There is no need to see my email account names/email names.


MY POINT IS: why would out of nowhere would there be an extra dialog box within my Mail Account configuration dialog box that gives me an option to associate, an account I'm setting up to be used with the Mail App, instead with the Notes App?!?

Jun 30, 2014 1:47 PM in response to morning sun

morning sun wrote:


MY POINT IS: why would out of nowhere would there be an extra dialog box within my Mail Account configuration dialog box that gives me an option to associate, an account I'm setting up to be used with the Mail App, instead with the Notes App?!?


It is possible that an Apple update added features or they changed a setting in iCloud that caused you to see the Notes settings in System Preferences.

It is also possible that you tweaked settings within Mail or the Notes app that caused iCloud to associate the account into the settings panel.


Do you think 'hackers' are going to make a nice icon & create a settings pane for System Preferences to dupe someone? Wouldn't it be simpler to steal your keychain & try to get/crack the password for it? They could add key loggers if they control your Mac, they can compromise other pieces of the OS. Instead they made a new settings panel?

What terribly civilized hackers you have.


What you describe is 'kinda fuzzy'. It seems normal to some people here as far as I can see (aside from the camera incident that you won't tell us about). If you are convinced you have been compromised the only solution is to shut down & reinstall from known safe sources (that means away from your network, since it's been running this 'hacked Mac').


Backup the data you have but avoid using it in read+write mode, frankly it shouldn't be read when on a network if you are viewing the 'compromised' data.

Erase & restore known good firmware to your router & any other device on the network that could be 'hacked' too. Then you have to spend time motoring traffic out to be sure that nothing untoward is going on.


The scale of damage could be huge if you really have been hacked and someone has a foothold on your network.


Assuming all 'strange things' are happening because of hackers likely to be a costly mistake. If you have your business running on this machine you may consider professional help. There are companies that will do forensic analysis, but it isn't cheap or quick.


If you want 'ultra paranoid security' find an OS like https://en.wikipedia.org/wiki/Tails_OS that will protect you by default and refuse to save to your disks.

Jun 30, 2014 1:51 PM in response to morning sun

morning sun wrote:


"you are only showing me your Notes which is not an email account and would normally only be associated with the Notes app"


Yes this is my Mail Account configuration dialog box.

No it is not, it is the service selector for whatever that account is, and Mail is turned off. This has nothing to with the configuration of either Mail or Notes. it's the on/off switch.

Jun 30, 2014 2:45 PM in response to morning sun

morning sun wrote:


Yes this is my Mail Account configuration dialog box. This dialog box should have nothing to do with the Notes App. This dialog box is intended to be used to set up an email account to be used with the Mail App.

No, it's not just for Mail and clearly includes Notes. You even have Notes highlighted in your screen grab, so it must be used to configure the applications used to access your notes. I suppose it could have been added to ML at some point, but it's been so long since I used it I can't say for sure, but it's certainly in 10.8.5. In Mavericks it has been replaced by the iCloud preference pane and includes all Mail accounts, Contacts, Calendar, Reminders, Notes, Safari, Keychain, Photos, Documents & Data, Back to My Mac, Find My Mac, Messages, Facebook and probably others that I don't use.


It certainly isn't unheard of for preference lists to become corrupted which would explain any change to your e-mail accounts. I wish I could tell you which .plist that was, but off-hand I don't know.

Jun 30, 2014 2:52 PM in response to morning sun

morning sun wrote:


What do you all think of the capabilities of Little Snitch?

I've been using it for years. PITA to setup, but once you've told it what apps, IP's, ports to trust, it serves to keep everything honest. You'll need to research a lot of normal processes to understand what they for and that they are legit, but you should never have to worry about a new unknown process communicating outbound.

Jun 30, 2014 4:15 PM in response to MadMacs0

That's my concern at this point any outbound transfers that are illicit. I feel secure in my inbound set up now that no malware will be able to get installed inbound from this point on but I still have a concern that some subtle malware App could have gotten installed previously when my set-up was much less secure that is still potentially recording keylogs, screen shots etc and sending them out.


Is Little Snitch reliable enough to catch even sophisticated malware communication outbound?


I know to be 100% sure I should do a 100% clean install of the OS. I'm just not wanting to spend the massive amount of time doing that and also I've heard a lot of mixed things about Mavericks... Plus my system is running very smooth. If Little Snitch can be relied upon I think I'll move forward with that and the clean bill of health I got from the terminal script review from Linc.


Again all of your comments are greatly appreciated... And I finally booted MacKeeper from my system!

Jun 30, 2014 4:20 PM in response to morning sun

morning sun wrote:


Is Little Snitch reliable enough to catch even sophisticated malware communication outbound?

AFAIK it catches all outbound communications. There is no analysis involved, so it won't be able to tell you what is being communicated, but as I said before it will make clear the process involved, the IP it's attempting to contact, the port and protocol (e.g. TCP, UDP) that is being requested. The only sophistication with regard to malware is that during the installation phase it may be able to detect that you are using LS and abandon the install.

Jun 30, 2014 4:50 PM in response to morning sun

Is Little Snitch reliable enough to catch even sophisticated malware communication outbound?


There are two things to consider here, both related to the fact that Little Snitch and any malware that may have been installed are both running on the same machine.


First, as MadMacs0 points out, malware may short-circuit itself if it detects the presence of Little Snitch. This is not speculation, it has been observed in real-world Mac malware, and provides a potential added benefit to the use of Little Snitch.


On the other hand, though, malware can potentially disable Little Snitch, if it is able to achieve sufficient privileges. This is also not speculation, and has been observed in the real world. Thus, using Little Snitch could give you a potentially false sense of confidence.


In addition, as MadMacs0 points out, you have to do a lot of learning early on when getting Little Snitch configured initially. This is sometimes a fatal flaw for some people, as I've seen it cause people to spiral down into unrecoverable paranoia. If you look for people saying that perfectly normal processes are malicious, you'll find them. For example, consider the perfectly normal mds process. If I search for "Mac mds virus", one of the top hits is a post on this forum saying:


I contracted the dreaded mds virus. There is also something called md worker--two files, in fact.


There are quite a few posts on here on how to disable it but how do it get rid of it completely? Also will disabling or getting rid of it mean the files it infected have to be replaced? I guess it must also be on my backup drive.


So, be sure to look at these things rationally, and don't start researching outgoing connections on the assumption that they must be malicious, or you'll find what you're looking for rather than the truth.

Jun 30, 2014 6:52 PM in response to thomas_r.

"On the other hand, though, malware can potentially disable Little Snitch, if it is able to achieve sufficient privileges."


If the Malware was sophisticated enough to detect and turn off LittleSnitch wouldn't the user see that it had been disabled?


Also what are the name types to be on the lookout for that LS would flag. From what I assume so far outbound processes that happen randomly, when I'm not triggering a process to communicate outbound, to destinations that are generic/unknown are the ones to look out for. Like here is a screenshot of something it caught but it is being sent out to macromedia which I believe is Adobe now so this one is safe right... Adobe can't be spying on me...


User uploaded file

New Terminal Results 4 Spyware / Keylogger Detection Review

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.