Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Traveling Rootkit

II've been dealing with a Rootkit issue for almost six months now. The Apple Store even said nothing was wrong but did a "clean install" just in case while I waited. I'm not sure they touched the EFI partition or Recovery Drive though. Booting from the Recovery Drive gives a very subtley altered version of the real thing and functions in a way that seems normal, but reading the install logs shows webooks and additional packages in tow including Asian Language Support and an update for Gatekeeper. I also called a friend on an uninflected Mac and compared fingerprints for Apples root certificate and they didn't match.


Reading dmesg shows ACPI turning over half of my processors to use elsewhere, Bluetooth daemons run even though Bluetooth is disabled, Postfix is always installed along with other components and config files that are clearly not from Apple, and if I poke around too much I suddenly get removed from the admin group and lose connection control of my system. Sometimes it just shuts down and the entire /sys folder is gone meaning I have to reinstall from scratch.


iI've got a MacBook Pro 10,2 but the firmware shown doesn't match the one Apple says is the most recent. It's a higher version that doesn't exist and I somewhere found a config file or polish file that denies downgrading firmware. Same with the SMC file. Since there's no CD drive and no printed media for Yosemite or even Maverick, I have to use internet recovery which is worthless since my DNS is hijacked. And anything installed or downloaded is injected with self-protecting and/or self perpetuating code. Image files and text files have executable tags on them. Even icons and color profiles. So just loading the desktop opens who knows what code just by displaying the background image, folder icons, and colorsync settings.


I had to start using terminal commands for everything because the gui interface apps were altered to remove important settings, but then I realized aliases and symlinks were being used to alter everything I do. I even wiped the drive completely including EFI partition and Recovery Drive but it still comes back even if I'm offline and unplugged. I've seen some rogue code ,entitling handoff and like I said before Bluetooth is running without being activated. I have a screenshot of the setting saying my Bluetooth interface is active next to the window showing it being turned off. And only half of my processors are being used. The other half are remapped during the boot process. By the way, resetting NVRAM and SMC did nothing.


It uses Migration Assistant to prevent a clean install. I can see the packages listed in the list file and they include EFI and SMC payloads. I just don't know how to edit the scripts without breaking the authentication. And installing XCode or Homebrew or anything that installs compilers and Python is like opening Pandoras Box. Not an option Since I'm not fast enough to keep up with the mess of new code files spewed forth that results.


Booting a Linux install CD from a USB drive will get me to a whole separate mess basically the same. i did manage to get into TAILS which slowed things down and downloaded SystemRescueCD and was able to zero out my drive. And Midnight Commander was able to parse some of the previously illegible code. But I still see a tftpboot folder that shows up on Mac or Linux even when the network is unplugged and offline. And no matter what there are always at least 60 entries in the /den folder for tty devices from tty1 all the way to ttyz89. And sometimes a list of pty devices too along with several loop devices, vcsa, vhost-net, etc. again this is on an offline computer. However, if I try to install Linux from the SystemRescueCD the initrd and kernel instructions point the installer to corrupted versions and APCI still runs even using the apci=off command in Grub. It then makes a copy of the CD somewhere so it can alter it and future boots are pointed there instead of to the actual disk. I verified this by unplugging the drive and it continued to function with new commands in directories I hadn't accessed..and it was not booted into RAM.


My favorite was when I tried to download Kali Linux and installed it. It had been modified to show every single app in every single category as ncat. Cheeky b@$t@rd$. I managed to download some files at the library but as soon as I copy them over they get altered.. Which reminds me... I need to try mounting as read only and run from the drive directly. But another weird thing.... Even on other networks it will rear its ugly head if my phone is around. I downloaded. Apps at a friends house and got one spurned to disk but by the second one I saw the same language encoding files and a css file with the same evil code getting burned to the disk.


IM pretty sure Subversion is being used to keep the whole apparatus up and complete. Deleting files does nothing because on reboot everything is back in place. I just can't figure out where the source is that's deploying these files is. Assuming there's an option ROM installed that is making it possible to repurpose my PCI devices to run the installers and other processes, could a host drive with the master disk image be hosted in a device too? Like someone else mentioned elsewhere, the Apple folks are useless. The "Genius Bar" guy cut me off when I tried to show him blatant entries in the logs and said they aren't trained to read code. Only engineers can do that. And I've been through three senior AppleCare techs. The first two basically laughed and called me paranoid, and the third keeps getting disconnected when I try to call. Which reminds me of another point, my phone data usage has more than doubled since this all started and there are all sorts of scripts involving VT100 commands. But even with all phones off and batteries removed It finds a way. I'm about to turn my closet into a Faraday cage but then I can't download software from Apples "Secure" Server.


ONe thing that would be useful... Oooooohhhhhh so useful... Is a repository of the files that make up the OS so I can see what is right and wrong. There's the open source stuff on the developers site but it's not easy to figure out what's what and it's not the latest version. ive been trying to use the Linux From Scratch site for a Linux version but since my certificates are forged I don't know if anything I read online is accurate. For all I know this post may never see the light of day. But the bottom line is this thing is big and sneaky and if we don't figure out how to kill it easily it's going to bring this entire world to its knees. I know several people who have it and don't even realize it. It only gets nasty and fights back when you start poking it.

MacBook Pro with Retina display, OS X Yosemite (10.10.2)

Posted on Jun 23, 2015 5:27 PM

Reply
Question marked as Best reply

Posted on Jun 24, 2015 8:01 PM

First of all, I believe you! Do you have any idea how the Mac became infected? It sounds like you contracted one of the new extremely rare firmware attacks. That means it's re-written your firmware to inject the rootkit every time you boot. If that is what happened, unfortunately you cannot remove it. You cannot overwrite the firmware. You would have to ship it back to Apple and have the system board replaced. This isn't just an Apple problem, there are PC rootkits capable of similar attacks. Another possible item is the root kit could be installed in the hard drive firmware. Attacks of this nature have been witnessed in the last 3-4 years and until recently were likely state sponsored groups behind them. This is not a run of the mill infection, it's quite advanced.


Final option to truly confirm the rootkit is in the firmware would be to do the following:

1. Buy a new thumb drive 8gb+ (preferably one with a write protect hardware switch or external forensics write blocker device)

2. Plug it ONLY into a known clean Mac and download Yosemite and burn to the thumb drive

3. Replace the internal Mac hard disk

4. Boot only from the write protected thumb drive and install Yosemite

5. If the rootkit shows up then it has to be coming from the Mac firmware

6. Sorry... You have a brick...


There really is no way around this, the firmware is used to boot and will always re-install the rootkit as you have noticed. Apple may be able to overwrite the firmware or replace the chip at their factory.


You might try to find a security researcher who would be willing to buy the Mac purely for the forensics and reverse engineering of this attack.

http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-m alware-that-jumps-airgaps/

http://arstechnica.com/security/2015/06/new-remote-exploit-leaves-most-macs-vuln erable-to-permanent-backdooring/


At some point malicious software was run as root or admin privileges that allowed the firmware to be overwritten. As a precaution in future, set a firmware password and ensure root account remains disabled and that you do not run a primary account as admin. Be extremely careful installing software. Avoid pirated software as many contain malicious payloads. Avoid the dangerous underbelly of the Internet / darknet, etc.

60 replies

Jul 24, 2015 8:30 AM in response to scissortail76

hey,


first i want to apologize for any typing issues, or pictures I may attach being in poor quality I am using my iPad (and taking screenshots via camera since I am reinstalling osx).


I Do believe you, and honestly am a but hesitant to even think you really exist lol. That's how frustrating this has been for me also, I figure I have also had this for several months. I have been an IT person since 2000 and worked at an exclusively mac studio for a few years. in addition I am pretty observant but not always up to date on new things that get changed on new OS updates. That being said... The first thing I noticed was an EFI partition, that seemed to appear out of no where. But at the same time I was updating to Yosemite, so I figure it was something new. The EFI partition tho was msdos format, which made me suspicious, why would mac add a partition that I dos based

2. my mac would randomly start rubbing the fan on high, and things would grind to a halt, when I had nothing really powerful open (web browsing vs Final Cut Pro or photoshop). The activity monitor would show windows server is using all the processes...and if I force quit it it would shut down and restart... I have force quit almost every item at one point in activity monitor and can't remember that happening slowdowns, errors with opening apps but nothing that completely restarts it. Leads me to...

3. Console, I checked it but found no items on windows server no mention at all, well not at first, one time it was happening and I was in console already, only to see it show up and disappear shortly after....

4. So my console was being changed but what was doing it, so I checked info and User, and noticed wheel... Again I never seen wheel before but it showed up everywhere all of a sudden. I looked it up and online said its been standard for macs since 2005. I worked with OS X server and OS X and I never remember seeing wheel as a ssystem user. But this wheel user would show up not on everything but alot of items... Things like iWork garage band wouldn't have it, but chrome, Safari, skype iTunes iPhoto, I installed Firefox and for a week it didn't then bam it showed up. Anything that I noticed started acting up, would have wheel in it.


SO, sorry for being so verbose but it's some of the things I noticed and checked.... there a things I noticed that bother the program and things that hinder it but haven't yet stopped it... it connects to wifi before u even know that being said it's tough to deactivate wifi on ur mac without opening it and unplugging it from logic board...but it only knows what you know, so if you delete a wifi from ur list it doesn't have it either. i say this cause booting ur computer in an area you don't have access to Internet is gonna be key to getting rid of it. I shut my wifi right off, then boot into recovery, ya its hacked but it works enough. Run disk util, do a pram reset, and boot into single user mode, which I haven't been able to get into for months. From here, if ur issue is like mine, go into directory utility, (may want to backup just in case) and remember the wheel user... I deleted it... And well... At that point, things started to make sense for me, console blew up with issues happening, even tho I had hidden files to be shown, tons of files appeared, Automator, apple scripts, extensions for skype chrome safari that never showed up before.

but that's where I am I don't have a solution yet I do have a reason why it's an issue reinstalling. Attached picture User uploaded file

tthis is a screen shot of a harddrive infected but completely wiped, i am booted to a USB Yosemite drive I made sevral months ago, which unfortunatly is now compromised.

disk2, eso is a additional group of files to install... It only shows when I boot to USB otherwise those disk don't show up. The files they contain specifically set up certain keychain access, remote view, and control.... I have an idea to beat it, but want to try it before I say anything....


FInally, it seems to comprimise applications but maybe you might still have luck at using things that worked at first, but after reinstalling osx now find them compromised also,


little snitch, super great against this, but lock it down dont let access to anyone but you.... What happened to me is second time I downloaded, it appended a ibstall file, so any new rules I create had the option of being owned by "system" "myself" or "anyone" the third option anyone now greyed out... Key for preventing updates to ur bin files it seems to do a lot, but by blocking its access to DNS, and having mac default to a known DNS I used google, the web stopped sending me garbage and fake sites.

either way find a firewall and keep it up block all access if things go bad the system firewall seems compromised


onyx also seemed to work pretty well but at one point something happened and admin access was deleted on my account, so I had no admin which I eventualily fixed.

I Could go on and on about things but recently that seems to be helping, every time I seem to be regain control and breaking free something happens and get knocked back. I do want to say it doesn't seem to be firmware based if I remove all my hard drives and plug in a bootable USB unaffected it doesn't get it. Stays clean.... Also, until I got ride of that wheel user, that kept me in the dark with false info, you don't really have admin control, you just have the illusion of it.

Jul 24, 2015 8:36 AM in response to bentleyonthego

OH also it seems to have a screen logger and key logger, which i caughit early on, I removed the key logger program by downloading it and running uninstaller. the key logger will log every pw u change, so when I changed one it would change it back. After removal issues with pw stopped... TThe keylogger program I can't recall the name but it was "key" something lol hope a portion of anything I said helps

Jul 24, 2015 8:54 AM in response to bentleyonthego

Ok, clearly you got hacked. Don't play around, backup your data (target disk mode would be preferred), and start from scratch. Do not restore your Apps from backup, just your data and then re-install everything. This isn't just malware it's hacker tools and there is a malicious someone fighting for control of your Mac. Unless you really want to honeypot him for security research you should just start over and be done with it.

Jul 24, 2015 9:04 AM in response to bentleyonthego

Sorry, but there's a heaping pile of nonsense and misunderstanding of what is on your Mac. Actually, as an IT person for Macs since 2000, it's rather amazing you don't appear to know any of the following.

The first thing I noticed was an EFI partition

Every physical drive that has been partitioned as GUID for the Mac will have an EFI table at the top of the drive, such as below. I set up Disk Utility to show the developer menu, which enables you to show all partitions, including normally hidden ones, such as the EFI tables. They also have no format to speak of. I highlighted one of them so you can see what information is shown for an EFI partition. Anyway, it's completely normal.


User uploaded file


my mac would randomly start rubbing the fan on high, and things would grind to a halt,

And why do you believe that automatically equates to malware? It could be a number of reasons, such as a corrupt OS installation, an issue with the logic board, bad RAM, etc. On our 2008 Mac Pro, we installed 8 extra GB of RAM from Other World Computing. Every time we used it for anything that taxed it even a little, the fans would ramp up to full blast until the process finished (like encoding a video). Finally, the Mac came on one day showing 4 GB less RAM than was installed. It turned out one of the 4 GB sticks we put in from OWC was bad from the day we got it and it finally croaked. They replaced it, and now the Mac is always quiet, no matter what it's doing. That bad stick was overheating every time it was being accessed.

and noticed wheel

The user wheel is completely normal. It belongs to the OS, as in "the big wheel". It's an account that allows the OS to do things that Unix permissions would otherwise stop a normal account from doing. It needs to be there so the OS can do its job.

and remember the wheel user... I deleted it...

Congratulations. You succeeded in completely destroying the OS by removing a required account. Now you get to erase the drive and start over. I wouldn't even attempt to just reinstall the OS over what exists given the sledge hammer approach you've taken to what are all normal processes.


There isn't a point to continue examining the rest of your content. You've butchered your system beyond repair by looking for things you think are there, and then proceeding to entirely ruin the system.

Aug 2, 2015 10:39 AM in response to bentleyonthego

Yes yes yes yes. All of that. Also found that certain services became unavailable if I turned music on. In other words if it was using audio for music it couldn't use it for hidden processes. Thanks for your info though. I was wrong about Chameleon... The drivers are all part of the chameleon install but removing it doesn't fix anything. Its reviving itself some other way either in the hardware or something even more bizarre.


Lately I've unearthed a ".MobileBackups" folder that seems to be created as a mtmfs disk by Time Machine. Every day something new shows up. Please keep me posted on your progress and I'll do the same.

Aug 2, 2015 11:02 AM in response to scissortail76

scissortail76 wrote:


Lately I've unearthed a ".MobileBackups" folder that seems to be created as a mtmfs disk by Time Machine. Every day something new shows up. Please keep me posted on your progress and I'll do the same.

The .MobileBackups folder is also normal, it is used on laptops to allow backups to happen when a Time Machine disk is unavailable. It is automatically emptied as free space becomes an issue.


You can read the manual and disable the local backups if you don't want them…

https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/ man8/tmutil.8.html

sudo tmutil disablelocal


Those backups will be removed whenever Time Machine decides to clear them out.

As ever Pondini explains how Time Machine works…

http://www.pondini.org/OSX/DiskSpace.html



Frankly you appear to be digging for a problem where non exist or you are failing to explain the problem succinctly enough to get real help. The major problem here is that there are parts of the OS you do not understand & you assume they are attacks, hacks, spies or evidence of something equally malicious. If you want help here explain the actual problem, not what you think might cause it.



Dust off & nuke your computer(s) from orbit if you want to rid yourself of the problem, it is the only way to be sure…

Aug 6, 2015 11:21 AM in response to Drew Reece

Thank you Drew for clearing that up. Now please explain everything else I already mentioned as well before telling me I don't know what I'm talking about.


The saddest thing to me in every single post like this is all the responses like yours telling people that there are parts of the OS they have no business messing with. Telling people to just shut up and keep it hidden and don't question it. I'm not running a nuclear power plant here... It's a personal computer. I can break it if I want to and then learn how it works by fixing it. You basically tell me not to mess with technology I don't understand, but that's exactly what I'm doing by using a computer that hides everything from me.


My AppleID stopped working... can't reset the password, AppleCare initially told me to contact law enforcement after they couldn't fix it, and now they won't answer my emails. So yeah, you're probably right. It's all in my head. Silly me.

Aug 6, 2015 1:07 PM in response to scissortail76b

The saddest thing to me in every single post like this is all the responses like yours telling people that there are parts of the OS they have no business messing with.

That's because, so far, that has been the correct answer. Drew's response was about as non-confrontational as a person can be. He did no more than describe that the folder in question was normal, and direct you to a supporting document. If his last paragraph was what you have a bit of umbrage with, he isn't the first person to suggest the same thoughts.

I can break it if I want to and then learn how it works by fixing it. You basically tell me not to mess with technology I don't understand, but that's exactly what I'm doing by using a computer that hides everything from me.

So you at least admit (in a sense) that the problems you're having are of your own doing. I'd love to help, but these continual trips down the rabbit hole of self-inflicted damage are getting old. Windows hides thousands of files, too. But I don't go rooting into the system folders and start deleting .dll and other files that sound "suspicious" to me.

AppleCare initially told me to contact law enforcement after they couldn't fix it, and now they won't answer my emails.

So did you contact law enforcement? Apple can only do so much to try and fix a user account. If the account was hacked and the password changed, privacy rules don't allow Apple to see what your original password was, or what it was changed to. Even it they look with your permission, it's encrypted. It's all for the user's safety that a company cannot enter anyone's account at will. Apple is far from the only company that does this. It's up to you to a) remember what your password is, and b) use a password that can't be easily guessed or cracked.

Aug 6, 2015 4:10 PM in response to scissortail76b

Did you contact law enforcement as advised by Apple?

If an iCloud account compromised it can lead to the Mac been controlled but it only has the same features as are available in the Find my Mac service. Back To my Mac can allow remote access if it was enabled (erasing the OS should stop that).

The Mac may contain evidence if it is actually compromised. Reinstalling OS's will obliterate that if it is stored on the disk, think about how you want to proceed.


scissortail76b wrote:

Thank you Drew for clearing that up. Now please explain everything else I already mentioned as well before telling me I don't know what I'm talking about.


Many of the points you raise can be explained by means that do not need you to be hacked. Here are just a few reposts to your posts, I've tried to keep it in order…


Gatekeeper is part of OS X. Asian language support is too, having them listed in install logs is normal. Webooks is unusual but it could be from a third party app, I really don't know at what state the OS was when that appeared.

The packages contained in the OS X installer can show the files to be installed if you really want to see how much is installed by default. I have a clean 10.10 install with over 350,000 files, it's more than I could keep track of.


Here is how OS X tells you what package installed one of those Automator actions, in Terminal…

pkgutil --file-info /System/Library/Automator/Activate\ Fonts.action/

volume: /

path: /System/Library/Automator/Activate Fonts.action/

pkgid: com.apple.pkg.Essentials

pkg-version: 10.9.0.1.1.1306847324

install-time: 1399430468

uid: 0

gid: 0

mode: 755

pkgid: com.apple.pkg.update.os.10.9.3.13D65.delta

pkg-version: 1.0.0.0.1.1306847324

install-time: 1400212681

uid: 0

gid: 0

mode: 755


It is installed via the 'Essentials' package & updated via the 10.9.3 delta update (yes this is a 10.9 Mac). It is part of a legitimate installer, you can go back & verify the install package certificate too if you still have the OS installer, it should be signed by Apple nowadays.


Certificates can vary across Macs if they are not using the same OS X version (& minor updates). It is also likely that a migrated Mac will have some legacy certificates in addition to the default ones. Apple have this list for verification…

List of available trusted root certificates in OS X Yosemite - Apple Support


The OS X installer includes Python by default, so avoiding Xcode does nothing to protect you from that or many of the other scripting environments, finding it is not a bad sign in itself.


Linux (and OS X) creates many devices, character devices & tty's in /dev. That is just how it operates. Have you ever heard the saying 'everything is a file in Linux or Unix'?

/dev is where hardware devices are turned into 'files' that can include files just for the status LED's of attached hardware etc, it is normal to see many entries, unless you have built the OS yourself & know how it all operates it can be difficult to unpick.


You found TAILS OS was slow. That is what happens when you run an OS that avoids writing to permanent storage. Also running from an external disk is slower than internal disks - did you full install it or USB boot it? TAILS tries to use TOR for all internet traffic, so it makes the internet many times slower, but you view it as a sign that the Mac is hacked.


You found a tftpboot folder in OS X, I assume you mean /private/tftpboot ?

That is normal even when networking is off. It is for OS X to host a server with a tftp share for other devices - it is nothing to do with how the OS is booting. OS X has many servers built in, most are disabled by default. Config files are installed for non-Apple services (such as the Apache web server), supporting files & folders are also created.


You installed Kali & then found the "Cheeky b@$t@rd$" had hacked your machine again & 'revealed' all the 'hacker tools' like netcat. Unfortunately Kali linux is a 'penetration testing & security' distribution. That is how it is designed. It is normal for those tools to appear in menus - it is a selling point of that OS. It is intended for security professionals.

Sorry but this isn't a sign of an elaborate EFI hack - it is a user jumping to conclusions because they don't understand the OS.


You tell us your DNS is hacked. If that is the case you can try to work out where the hack is & avoid it (it is either on your network or external to it). Start by using another network. Reset your router if you think it is compromised (or replace it). There is some good starting info at …

http://www.thesafemac.com/how-to-manage-a-hacked-wireless-router/

Have you contacted your ISP? They may explain why you are assigned the IP. A 'class A' range does not have to be a public address, the 10.x.x.x range is a class A, but is only available as a private network. If you don't trust the ISP change the supplier.


Get the OS X installer via a connection that you do not think is 'hacked' & it should create a clean, secure installation. Ask at an Applestore if they will download it for you if you trust them.


Reduced numbers of processors may show up if you have failing hardware. Have you run Apple hardware test?

Using Apple Hardware Test - Apple Support


Your 500GB hard disk showing around 450G is normal if it is using Gibibytes instead of Gigabytes - it really depends on the method used to view it, linux distros show it using different units, 465GiB seems about right …

http://www.wolframalpha.com/input/?i=500+gigabytes+in+gibibytes


You found EFI & SMC payloads in the OS X installer - once again normal. OS X can require firmware updates so it bundles them to make the upgrade process easier.

netstat shows many internal connections - even when the Mac is not networking. OS X opens sockets to itself, again I see this on a clean Mac with no networking enabled.


/home & /net are normal hidden folders on OS X, those Automator actions are also in a standard install.


On a clean 10.10.3 here is a count of the System launchd jobs…

ls -l /System Library/LaunchAgents | wc -l

211

ls -l /System Library/LaunchDaemons | wc -l

261



I do think that tearing into a system is a good way to learn, but you are not tweaking & learning, you are hunting for things that look scary & assuming they are bad. Many many of the things you find look scary to untrained eyes, which is why Apple told you to seek help from law enforcement. They are trained to forensically break down compromised machines whilst preserving evidence. Dig into the OS, break it, reinstall it, break it again, it is a fun way to learn, but that is different to hunting for signs of a compromise.



I don't doubt that it is possible for Thunderstrike or any of the other historically known 'DMA attacks' to cause some of what you claim (the potential has been known since before Firewire was invented). It just seems unlikely, I haven't seen reports of these attacks used 'in the wild' & these complex persistent attacks seem to have been the reserve of nation states who don't generally target just anyone. You don't say if you work for a government or related agency so I doubt you are a target and if you are their target they have failed since you have discovered so much!


Many of your claims here are not signs of an attack, they are just mistakes you made. It makes it practically impossible to distinguish what is fact & what is you misunderstanding the internals of these OS's. Your descriptions of 'it' jumping around from Mac to Mac & to iOS devices also make it sound beyond what we have seen, not impossible, but very implausible. You haven't defined what 'it' is either beyond a fuzzy feeling that something is wrong.


It sounds drastic, but if you have the rootkit that you think you have then it would be a permanent fixture of these devices - unremovable. Apple patched Thunderstrike in newer OS's so your only option would be to stop using the devices (hand them all to the police) & acquire new ones. If you have any Apple warranty, return them.


P.S.

I'm not trying to discredit everything you said, I'm just suggesting that you are missing many nuances & features of several complex systems.

Aug 12, 2015 8:09 AM in response to Drew Reece

Thank you for taking the time to read and reply so thoroughly but most of your assumptions are incorrect. Unfortunately you see the world differently than I do. I see an overall system that is not as it should be and is not running as efficiently as I know it should. I have a very keen impression of how a system feels and makes me feel when I interact with it, and this does not feel even close to right. That is what it means to get the many nuances of several complex systems. You have described everything in terms and definitions that are all separate from each other but you have not stepped back to see it all together as the unit it is or explained what it means that all these anomalies have happened at the same time and in symbiosis with each other. So sure I may miss a few definitions here and there and assume a few things are bad that are harmless but I know there is something very very sinister behind what is going on. So now take this paragraph and split it up into individual comments and respond with your jabs and self righteous rhetoric but when you're done all you will have done is taken a complex and organic concept and chopped it up into parking lots and coffee shops. And if that makes no sense to you then good.


End of discussion.

Aug 12, 2015 10:46 AM in response to scissortail76

You asked for a breakdown that explained why you are misunderstanding these OS's, I did that but you still choose to ignore it. Apple told you to seek legal help, yet you keep ignoring our requests for the status of your legal assistance. There is no point in trying to help you.


Good luck explaining your feelings to the Police or to Apple. Your devices need forensic investigation to prove or remove any of the spurious things you claim to have found.

Feelings have no place in technical examinations of electronics.

I have no need to 'step back' for an overview, I have looked at all your posts here already, there is only evidence of your repeated mistakes & assumptions related to how all of these OS's work. The one constant factor here is you are making assumptions that are provably wrong.

I wish you luck, I hoped you would see sense, but you are clearly being deluded by your feelings.

Aug 13, 2015 8:49 AM in response to scissortail76

Scissortail76, I believe you. I sincerely apologize for the conduct of some of the members of this community. I gather from your original comments that you have been struggling with this issue for over half a year now and have made numerous attempts seeking assistance to no avail. I'm going to go out on a limb here and also assume you've suffered the same sort of undue slights and dismissive skepticism on display in this thread at every turn for help, right?


The good news is you're (probably) not crazy. At the very least I believe you deserve the benefit of the doubt until all the facts are on the table. Good for you for respecting your own intuition and not being swayed by those unqualified to render an accurate verdict on your situation short of all the necessary facts. I admire your perseverance.


Unfortunately, this thread went down a predictable, almost formulaic path which has not only done you a disservice but the Mac and security minded community as a whole. The brightest, most active members of a forum community such as this occasionally succumb to their own knee-jerk biases and institutional fatigue with answering the same monotonous questions from the same drive by users who, most of the time, fail to grasp the nuance and complexities of their systems. An echo chamber of conventional wisdom combined with an almost impenetrable wall of skepticism and disinterest results in situations like yours having a high chance of getting shouted down. Then, trolls like Kurt forget they are responding to another human being that deserves respect and common decency, and inevitably they pile on.


The same thing happens when a user spots a legitimate, undocumented bug in a product or service for the first time. If you've ever tried to route a real bug up the chain as a normal consumer you'll know what I mean. If I was a betting man, I would admittedly place my bet against you being right about this improbable scenario of yours.


As a thought experiment, let's say you're wrong but your initial premise (that you've been using Macs for years and know enough to know when one of your systems is behaving in an extreme fashion, out of the ordinary) is true. Judged on how you've been treated, I don't see much incentive on your part to persist this long if you were making it all up. I think the experts on this forum would likely have been more attentive and inevitably flushed out whatever was actually going on if everyone had kept an open mind and remained civil. Worst case scenario is you're wrong, you finally get resolution to your issue and a healthy learning opportunity is shared by all. Instead, the onus was placed on you to demonstrate overwhelming proof, as well as demonstrate a flawless understanding of the inner workings of your operating system, networking technologies, programming, security etc. I must point out that this is not a prerequisite for you being right or wrong.


If I wasn't going through the same exact thing myself I might have been quick to judge as well. You aren't alone, however. What you are describing is rare, but real. I encourage you to reach out to me directly and I will do my best to put you in touch with those that can hopefully help. At the very least we can share notes.

Traveling Rootkit

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.