.ellelle

Q: System Integrity Protection

Months later and I'm still dealing with this. Apple Care, Genius Bar local service providers et. al have all worked on 3 of 4 machines(4th is under a month old).

 

Short story: MacBook Pro, two MacBook Airs and iMac all compromised. All have been clean installed, securely wiped and no data transferred.

The first "attack" I observed on December 10, 2015 as Bluetooth File transfer opened and files from my library were moved. Next 

Automator opened and crashed my machine. I disconnected wifi the moment I realized what was happening.

After weeks of bad advice, no help and a small fortune I found a hidden partition on the starup disk containing the malicious files. They are similar to normal OS X recovery files.

I attempted a reset in terminal but I am not the administrator of my machine. No wifi turned on yet the machine is connected to a local network.

Is there anyway to restore SIP and regain control of my system?

--most of the disk-utility menu for starup disk are gryed out. If I search for image, there are several connected devices that appear,

 

Apole suggested the yellow pages, My area has one service provider who "fixed" the problem. They recommended selling them.

For Clarification:

YES I tried a clean install via Apples instructions; new usb, made from a different machine away from my network.

My network is currently secure with non-default passwords, new modem, access point, and an enterprise level external  firewall.

I was originally using java script/ chrome a requirement for school.

No dark web, pornographic shady websites were visited.

All software was purchased via the App Store minus 3 professional programs that were installed via usb.

 

weeks of absolute ****!

MacBook Pro

Posted on Jan 29, 2016 8:28 PM

Close

Q: System Integrity Protection

  • All replies
  • Helpful answers

Page 1 Next
  • by Leopardus,

    Leopardus Leopardus Jan 29, 2016 10:22 PM in response to .ellelle
    Level 4 (1,087 points)
    Desktops
    Jan 29, 2016 10:22 PM in response to .ellelle

    Ok you will have to provide a bit more information. Did you or anybody else disable SIP? It can only be done when someone has access to your Mac. To find out if it is, open terminal and type:

     

    csrutil status


    to find out what the status of your SIP is. It can be easily enabled again.

     

    You seem to have migrated from the scary world of Microsoft and their virus paranoia. OS X does run some scheduled maintenance tasks which might include moving and or removal/replacement of files.

     

    Reading, to gain, strengthen or verify knowledge has no substitute and no equal. Apple's own documentation takes a lot of grinding and guidance to read and understand. Much easier to read, follow and understand are the three books of Reid Bondonis, although written for Server, the first one (titled 'Foundation Services') makes some very good reading material. You will also gain a lot by reading Apple's own 'Mac Integration Basic 10.x' into understanding some and more about the OS.

     

    Finally, if you can run Etrecheck and post the result thereof, all of us will have an insight into what are the problems bugging your Mac, and offer you the advice required on a more factual basis to have you up and running quickly. (Etrecheck is available for download, and is written and maintained by a very well respected member of the Apple Service Community) If you do some searches for it, the results will speak for itself.

     

    Leo

  • by MrHoffman,

    MrHoffman MrHoffman Jan 30, 2016 6:11 AM in response to .ellelle
    Level 6 (15,612 points)
    Mac OS X
    Jan 30, 2016 6:11 AM in response to .ellelle

    I am somewhat unclear around what you mean by your reference to not being administrator — is this system managed and supported by somebody else, or are you logged in as a standard user and not an admin user?

     

    Related: what commands or errors were involved with your "I attempted a reset in terminal but I am not the administrator of my machine." sequence?   Who is the administrator?

     

    Bluetooth is short-range, which means something very local to your system.   Bluetooth is separate from and does not involve Wi-Fi.   Disconnecting Wi-Fi is ineffective against Bluetooth-based access.   NVRAM and SMC resets and a reinstallation should clear any existing references to Bluetooth devices, in conjunction with a complete disk wipe.

     

    Switch to wired connections for your keyboard, mouse and network.  Disable Bluetooth.  Disable Wi-Fi.

     

    Are there any wired connections with these systems, or other devices on your wired or Wi-Fi network beyond the Macs and the ISP box?  Any printers or other wired or Wi-Fi or Bluetooth network-connected devices on your local network?   Have you checked all the cabling?

     

    And to confirm: were all partitions erased as part of the installation, and the disk entirely repartitioned?

     

    To confirm: all passwords were changed?  Wi-Fi, gateway box, email servers, everything?  All local and network connections were confirmed as or were switched to TLS connections, as well?

     

    You mention the presence of a second partition similar to the recovery partition — it's entirely feasible to create your own recovery partition.   Getting that onto an erased disk, however, is not nearly as easy.   You mention similarities, which implies there are differences from the standard recovery partition.  What's different about that, as compared with the standard recovery partition.  Was there also a recovery partition present?

     

    Who else has access to these computers?   Anyone with keys to the area where these computers are kept, or any low-quality or easily-bypassed door locks, or any master keys around?   (What you're describing could well involve physical access.   So-called "black bagging".   That'd make this entire sequence easily and quickly feasible, too.) 


    Any reasons for somebody without authorized access to these computers want to gain access to them and to your data?  Are you a target of some sort?


    Etrecheck output might help and its output might be useful here, but it's not intended to find partition-level shenanigans.

     

    Based on what you're describing, this is headed toward a forensic dump of the systems involved, and a look at the physical security, and some other reviews.

  • by .ellelle,

    .ellelle .ellelle Jan 30, 2016 7:23 AM in response to Leopardus
    Level 1 (0 points)
    Jan 30, 2016 7:23 AM in response to Leopardus

    Please forgive my brevity and lack of context. Frustration is at its boiling point.

    csrutail status returns "command not found"

    I have been using Macs since 2002 and this is my first experience with anything virus related.

    Is there a method to run Etrechek in terminal? All of my machines are currently in recovery mode.

  • by .ellelle,

    .ellelle .ellelle Jan 30, 2016 7:32 AM in response to MrHoffman
    Level 1 (0 points)
    Jan 30, 2016 7:32 AM in response to MrHoffman

    As far as physical acces no one. Home is alarmed and cpu's that leave the home are in my possession at all times.

    Obe machine goes to school with my daughter but they go from desk to locker and are regulated.

    The only wired connection available is a direct connection from the external firewall to the Ethernet port. Originally used a few times to come to speed OSx downloads. No printers etc.

    The recovery partition indicates removable disks. File names are close to system files but 1 or 2 letters off. I have photos but can not upload from iPhone

  • by Esquared,

    Esquared Esquared Jan 30, 2016 7:44 AM in response to .ellelle
    Level 6 (8,410 points)
    Mac OS X
    Jan 30, 2016 7:44 AM in response to .ellelle

    It's: csrutil status

    Not: csrutail status

  • by pinkstones,

    pinkstones pinkstones Jan 30, 2016 7:49 AM in response to .ellelle
    Level 5 (4,209 points)
    Safari
    Jan 30, 2016 7:49 AM in response to .ellelle

    .ellelle wrote:

     

    Please forgive my brevity and lack of context. Frustration is at its boiling point.

    csrutail status returns "command not found"

    I have been using Macs since 2002 and this is my first experience with anything virus related.

    Is there a method to run Etrechek in terminal? All of my machines are currently in recovery mode.

     

    There are no viruses for OS X.

  • by MrHoffman,

    MrHoffman MrHoffman Jan 30, 2016 8:46 AM in response to pinkstones
    Level 6 (15,612 points)
    Mac OS X
    Jan 30, 2016 8:46 AM in response to pinkstones

    pinkstones wrote:

    There are no viruses for OS X.

     

    There is malware for OS X.   Whether the malware happens to be defined as a "virus", a "trojan" or a "worm", or whether it's some sort of blend, or something newer?   For now, how the malware has gotten onto this system and how it is persisting or being reintroduced is (at least to me) more interesting.   Now figuring that out, and getting rid of it, will help the OP.    Yes, this could theoretically involve a Word macro virus for OS X.  Or a trojan.  Or it could well be some new virus, or some other sort of dreck, or something related to Bluetooth or Wi-Fi or something else.

  • by MrHoffman,

    MrHoffman MrHoffman Jan 30, 2016 9:07 AM in response to .ellelle
    Level 6 (15,612 points)
    Mac OS X
    Jan 30, 2016 9:07 AM in response to .ellelle

    .ellelle wrote:

     

    As far as physical acces no one. Home is alarmed and cpu's that leave the home are in my possession at all times.

    Obe machine goes to school with my daughter but they go from desk to locker and are regulated.

     

    Then that system is physically easy for folks to access, particularly when in a locker.   The locks issued by and/or the locks used at most schools are utter junk.

     

    Once the systems are cleaned off and reloaded, FileVault can help with some of the common paths for access, as can a firmware password.   For a somewhat more paranoid approach, maybe some factory seal tape or — less reliable — an unusual color of nail polish applied on the screws, too.

     

    Kids — most people using computers, for that matter – can swap software around, and can occasionally reveal passwords, and that occasionally doesn't end very well.   And I include myself in those lists, BTW.

     

    But with physical access to that system apparently available, all bets are off.

     

    The only wired connection available is a direct connection from the external firewall to the Ethernet port. Originally used a few times to come to speed OSx downloads. No printers etc.

     

     

    I'd have a look at the gateway box you're using, and at its particular capabilities and logging abilities.   Specifically, whether that can log inbound and outbound connections.  Also a look at what ports are open, too.   If the gateway is not capable of some basic security operations and is not capable of implementing outbound traffic blocks, I'd consider a replacement or an upgrade.

     

    The recovery partition indicates removable disks. File names are close to system files but 1 or 2 letters off. I have photos but can not upload from iPhone

     

    I don't know what you mean by "indicates removable disks".    You're going to want or need to get that disk examined forensically.   Photos are a pain to deal with, as they can't be easily searched.  Somebody to take a very close look at that partition, at what the stuff is and is or is not doing, whether it's malware or some cache or such, whether it's actively contacting some host and/or probing the local network, etc.  That's not going to happen here in the forums, in other words.

  • by pinkstones,

    pinkstones pinkstones Jan 30, 2016 9:19 AM in response to MrHoffman
    Level 5 (4,209 points)
    Safari
    Jan 30, 2016 9:19 AM in response to MrHoffman

    MrHoffman wrote:

     

    pinkstones wrote:

    There are no viruses for OS X.

     

    There is malware for OS X.  

     

    I'm aware of that.  I didn't say there was no malware, though.  There are no viruses currently in the wild that can do any damage to OS X, hence why anti-virus programs are not currently necessary on Apple computers.  They can't actually protect you from anything. The malware/adware that affects Macs has to be downloaded and installed by you for it to do any damage, and no program on Earth can keep you from downloading something you shouldn't from some place you shouldn't.  Only common sense can do that.

  • by .ellelle,

    .ellelle .ellelle Jan 30, 2016 9:45 AM in response to MrHoffman
    Level 1 (0 points)
    Jan 30, 2016 9:45 AM in response to MrHoffman

    Proof aside. Is there a mechanism to restore SIP if it has been disabled?

    If I am no longer the admin of my machine is there any way to restore SIP?

  • by MrHoffman,

    MrHoffman MrHoffman Jan 30, 2016 10:03 AM in response to .ellelle
    Level 6 (15,612 points)
    Mac OS X
    Jan 30, 2016 10:03 AM in response to .ellelle

    If you are no longer administrator, then you're going to have to access a different administrator account, become administrator, or reinstall.  

     

    What other administrative users are still present?   If any.   If there are other administrative users, then use the password reset mechanism on one of those users.

     

    Failing that, here's a sequence that can purportedly create an administrator account but — if you've lost administrative access — then enabling SIP isn't going to help, and I'd make a disk backup or two, and nuke and pave the system.

  • by Leopardus,

    Leopardus Leopardus Jan 30, 2016 10:20 AM in response to .ellelle
    Level 4 (1,087 points)
    Desktops
    Jan 30, 2016 10:20 AM in response to .ellelle

    In addition to what MrHoffman has said above, here are the options for the usage of csrutil. Note that enabling, disabling and to clear could only be done from the Recovery OS. That means that someone has to physically start the Mac in Recovery, and start the Terminal from there afaik.

     

    usage: csrutil <command>

    Modify the System Integrity Protection configuration. All configuration changes apply to the entire machine.

    Available commands:

     

        clear

            Clear the existing configuration. Only available in Recovery OS.

        disable

            Disable the protection on the machine. Only available in Recovery OS.

        enable

            Enable the protection on the machine. Only available in Recovery OS.

        status

            Display the current configuration.

     

        netboot

            add <address>

                Insert a new IPv4 address in the list of allowed NetBoot sources.

            list

                Print the list of allowed NetBoot sources.

            remove <address>

                Remove an IPv4 address from the list of allowed NetBoot sources.

    .

    Leo

  • by notcloudy,

    notcloudy notcloudy Jan 30, 2016 10:34 AM in response to pinkstones
    Level 4 (1,190 points)
    Desktops
    Jan 30, 2016 10:34 AM in response to pinkstones

    I think virus has become a generic term for something happening that should not be.

     

    You can probably still find it on news sites -- Apple had to pull some Applications from its App store because they had malware in them.   Probably was in december - hope they informed people who purchased the App.

     

    The OP may also have an issue with WI-Fi integrity/security.    Depends on the installers ability to secure it.

  • by MrHoffman,

    MrHoffman MrHoffman Jan 30, 2016 10:53 AM in response to Leopardus
    Level 6 (15,612 points)
    Mac OS X
    Jan 30, 2016 10:53 AM in response to Leopardus

    Leopardus wrote:

     

    In addition to what MrHoffman has said above, here are the options for the usage of csrutil. Note that enabling, disabling and to clear could only be done from the Recovery OS. That means that someone has to physically start the Mac in Recovery, and start the Terminal from there afaik.

     

    it's possible to disable system integrity protection dynamically, if you have kernel access.

     

    But again — if SIP has been disabled via the recovery boot or otherwise — none of what is installed can be trusted.

Page 1 Next