How to detect malware stealing my credit card info?

Someone is repeatedly stealing my credit card information. I have just had to order my third American Express card this year. The fraud team there told me that two things are likely happening, either (1) a merchant with whom I do business in a brick & mortar store is stealing my CC info; or (2) there is malware on my computer recording my keystrokes and stealing my CC info. Because I have a Mac the latter is less likely, but the only option over which I have some sort of control. I'd like to determine whether scenario #2 might be happening. I do 90% of my Internet shopping on my MacBook Pro (running OS Yosemite, 10.10.3) and the other 10% on my iPhone 6 (running iOS 8.3). Can anyone advise me how to determine whether someone might be stealing my CC info from either of these sources?

MacBook Pro, Mac OS X (10.6.8)

Posted on May 1, 2015 8:22 AM

Reply
3 replies

May 1, 2015 10:12 AM in response to DClawyermama

Another thought is to consider the possibility that your Apple ID credentials have been stolen. Considering that iCloud Keychain (if you use it) contains credit card information, your Apple ID holds the keys to your digital kingdom. If you have not changed your Apple ID / iCloud password, consider doing that.


To change your Apple ID or iCloud password read iCloud: Change your iCloud account password.


Apple's "two-step verification" is another roadblock for identity thieves, though in my opinion it will result in some inconvenience for yourself. Consider it; you can always disable it if you decide it's not worth the inconvenience.


Frequently asked questions about two-step verification for Apple ID - Apple Support

May 1, 2015 10:26 AM in response to DClawyermama

The fraud team there told me that two things are likely happening

They left out #3, which is even more likely: there's an internal security breach at the card issuer.

There's essentially no chance that your problem is caused by spyware, but if you want to rule it out completely, you should erase the startup volume, reinstall OS X, and restore only documents from a backup. All third-party software should then be reinstalled from fresh downloads or original media.

If you don't feel like doing that, see below, but the chances of finding anything are practically nil.

1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.

The test works on OS X 10.7 ("Lion") and later. I don't recommend running it on older versions of OS X. It will do no harm, but it won't do much good either.

Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.

2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.

There are ways to back up a computer that isn't fully functional. Ask if you need guidance.

3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can act on it yourself without disclosing the contents to me or anyone else.

You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.

In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.

You may not be able to understand the script yourself. But variations of it have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message. See, for example, this discussion.

Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.

4. Here's a general summary of what you need to do, if you choose to proceed:

☞ Copy a particular line of text to the Clipboard.

☞ Paste into the window of another application.

☞ Wait for the test to run. It usually takes a few minutes.

☞ Paste the results, which will have been copied automatically, back into a reply on this page.

These are not specific instructions; just an overview. The details are in parts 7 and 8 of this comment. The sequence is: copy, paste, wait, paste again. You don't need to copy a second time.

5. Try to test under conditions that reproduce the problem, as far as possible. For example, if the computer is sometimes, but not always, slow, run the test during a slowdown.

You may have started up in safe mode. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.

6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.

7. Load this linked web page (on the website "Pastebin.") The title of the page is "Diagnostic Test." Below the title is a text box headed by three small icons. The one on the right represents a clipboard. Click that icon to select the text, then copy it to the Clipboard on your computer by pressing the key combination command-C.

If the text doesn't highlight when you click the icon, select it by triple-clicking anywhere inside the box. Don't select the whole page, just the text in the box.

8. Launch the built-in Terminal application in any of the following ways:

☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)

☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.

☞ Open LaunchPad and start typing the name.

Click anywhere in the Terminal window to activate it. Paste from the Clipboard into the window by pressing command-V, then press return. The text you pasted should vanish immediately.

9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter

exec bash

and press return. Then paste the script again.

10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. If you don't know the password, or if you prefer not to enter it, just press return three times at the password prompt. Again, the script will still run.

If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.

11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, a series of lines will appear in the Terminal window like this:

[Process started]

Part 1 of 8 done at … sec

Part 8 of 8 done at … sec

The test results are on the Clipboard.

Please close this window.

[Process completed]

The intervals between parts won't be exactly equal, but they give a rough indication of progress. The total number of parts may be different from what's shown here.

Wait for the final message "Process completed" to appear. If you don't see it within about ten minutes, the test probably won't complete in a reasonable time. In that case, press the key combination control-C or command-period to stop it and go to the next step. You'll have incomplete results, but still something.

12. When the test is complete, or if you stopped it because it was taking too long, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.

At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.

If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.

13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "The message contains invalid characters." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.

14. This is a public forum, and others may give you advice based on the results of the test. They speak for themselves, not for me. The test itself is harmless, but whatever else you're told to do may not be. For others who choose to run it, I don't recommend that you post the test results on this website unless I asked you to.

______________________________________________________________

Copyright © 2014, 2015 by Linc Davis. As the sole author of this work (including the referenced "Diagnostic Test"), I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

May 1, 2015 10:02 AM in response to DClawyermama

Keylogger software exists, but is something that has to be deliberately installed by someone with physical access to your Mac.


I'd like to determine whether scenario #2 might be happening.

There are several ways of determining the existence of known keylogger software, but they essentially require knowing in advance what you're looking for to begin with. While it would certainly be beneficial to find the existence of something and provide eradication instructions, it would be no comfort to determine that nothing was found. If someone were especially devious it wouldn't be out of the question to find an easily discoverable keylogger installed as a "decoy" while another, more difficult one to find escapes all notice.


It doesn't take much more speculation to conclude the only reasonable way of assuring yourself a software keylogger is not present would be to completely erase your Mac and reconfigure it using software from reliable sources. However, it gets worse: determining the existence of a hardware keylogger would require an intensive, hands-on inspection of your Mac. Similar concerns with that technique also exist, when you consider the fact that it is possible to fabricate a component with fraudulent exterior markings completely identical to legitimate components that should be present. Such products already plague the electronic component market, though the reason is that it's an effort to circumvent device copyright restrictions rather than create products to spy on people. There is a lot more money at stake in the former.


Much of this is wild speculation, but it is absolutely possible, and becomes more likely if you have reason to believe you are the subject of intense interest from entities with large budgets. At some point you have to ask yourself if someone is not using more mundane ways of stealing your personal information, which range from the possibility of a hidden camera in your office, to going through your trash, to someone casually looking over your shoulder as you type in a password or other sensitive information. Those techniques aren't technologically challenging whatsoever and require little or no money at all.


Given those circumstances, decide for yourself whether your Mac is likely to be the source of the stolen information or not. That's about all the technological advice I can offer, regarding a subject that is more likely a legal matter that goes beyond the scope of this support site.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

How to detect malware stealing my credit card info?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.