Pirrit - how to custom restore your data without infecting an erased MacBookPro?

On 31 May 2016 I started to get pop-up ads. The next day as the problem got worse I bought Bitdefender and downloaded MalwareBytes both of which found and deleted adware/malware. However, as CJ706 says, Bitdefender has continued to find Pirrit malware despite detecting and clearing it and despite restarts. I keep getting pop-up ads and discrete words in articles that I am reading are highlighted green sand link to ad sites. My MacBookPro is working much more slowly and the webpages regularly freeze. Re-launching Safari with the shift button held down has at least stopped the new advertising webpages opening up .


I am now backing up my data onto a newly purchased external hard disk drive so as not to risk corrupting my standard back up drives and will do an erase and reinstall. Can anyone advise me how to migrate my data and applications and apps on Time Machine without doing an automatic reinstall that would bring the malware across?


Also, I have been advised (from someone not familiar with Macs) to install Bitdefender and MalwareBytes before migrating any data. How can I bring these across from my Time Machine back up before migrating any other data?


Finally, I think that I downloaded Pirrit when trying to play a video within a news story from the BBC or the Daily Mail. I had repeated pop up windows saying that my version of Flash was not up to date and I had to repeatedly download Flash from what I thought was the Adobe website. The video still didn't play after I had downloaded Flash. From what I have read Pirrit comes via a false Flash pop-up ad. Is it possible that I could have downloaded Pirrit from malign pop-up ads on these sites which I thought that I could trust?


Thanks

Posted on Jun 4, 2016 1:33 PM

Reply
26 replies

Jun 4, 2016 7:33 PM in response to Belfast MacUser

1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.

The test works on OS X 10.8 ("Mountain Lion") and later. I don't recommend running it on older versions of OS X. It will do no harm, but it won't do much good either.

Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.

2. If you don't already have a current backup, please back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.

There are ways to back up a computer that isn't fully functional. Ask if you need guidance.

3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can act on it yourself without disclosing the contents to me or anyone else.

You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.

In this case, however, there are ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone who understands the code can verify what it does.

You may not be able to understand the script yourself. But variations of it have been posted on this website many times over a period of years. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message. See, for example, this discussion.

Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.

4. Here's a general summary of what you need to do, if you choose to proceed:

☞ Copy the text of a particular web page (not this one) to the Clipboard.

☞ Paste into the window of another application.

☞ Wait for the test to run. It usually takes a few minutes.

☞ Paste the results, which will have been copied automatically, back into a reply on this page.

These are not specific instructions; just an overview. The details are in parts 7 and 8 of this comment. The sequence is: copy, paste, wait, paste again. You don't need to copy a second time.

5. Try to test under conditions that reproduce the problem, as far as possible. For example, if the computer is intermittently slow, run the test during a slowdown.

You may have started up in safe mode. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual before running it. If you can only test in safe mode, do that.

6. If you have more than one user, and only one user is affected by the problem,, and the affected user is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.

7. Load this linked web page (on the website "Pastebin.") Press the key combination command-A to select all the text, then copy it to the Clipboard by pressing command-C.

8. Launch the built-in Terminal application in any one of the following ways:

☞ Enter the first few letters of its name ("Terminal") into a Spotlight search. Select it in the results (it should be at the top.)

☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.

☞ Open LaunchPad and start typing the name.

Click anywhere in the Terminal window to activate it. Paste from the Clipboard into the window by pressing command-V, then press return. The text you pasted should vanish immediately.

9. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. If you don't know the password, or if you prefer not to enter it, just press return three times at the password prompt. Again, the script will still run.

If the test is taking much longer than usual to run because the computer is very slow, you might be prompted for your password a second time. The authorization that you grant by entering it expires automatically after five minutes.

If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.

10. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, a series of lines will appear in the Terminal window like this:

Test started

Part 1 of 4 done at: … sec

Part 4 of 4 done at: … sec

The test results are on the Clipboard.

Please close this window.

The intervals between parts won't be exactly equal, but they give a rough indication of progress.

Wait for the final message "Please close this window" to appear—again, usually within a few minutes. If you don't see that message within about 30 minutes, the test probably won't complete in a reasonable time. In that case, press the key combination control-C or command-period to stop it. Then go to the next step. You'll have incomplete results, but still something.

In order to get results, the test must either be allowed to complete or else manually stopped as above. If you close the Terminal window while the test is still running, the partial results won't be saved.

11. When the test is complete, or if you stopped it manually, quit Terminal. The results will have been saved to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.

At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "close this window" message. Please wait for it and try again.

If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.

12. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "The message contains invalid characters." That's a bug in the software that runs this website. Please post the test results on Pastebin, then post a link here to the page you created.

If you have an account on Pastebin, please don't select Private from the Paste Exposure menu on the page, because then no one but you will be able to see it.

13. When you're done with the test, it's gone. There is nothing to uninstall or clean up.

14. This is a public forum, and others may give you advice based on the results of the test. They speak for themselves, not for me. The test itself is harmless, but whatever else you do may not be. For others who choose to run it, I don't recommend that you post the test results on this website unless I asked you to.

15. The linked UNIX shell script bears a notice of copyright. Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

Jun 4, 2016 8:11 PM in response to Belfast MacUser

Hello Belfast MacUser,

You shouldn't have to reinstall. Mac malware is pretty easy to remove. I wrote a little diagnostic program to help show what adware is installed. Download EtreCheck from http://www.etrecheck.com, run it, and paste the results here. EtreCheck is perfectly safe to run, does not ask for your password to install, and is signed with my Apple Developer ID.



If adware is installed, EtreCheck will help you remove it, although you may have to supply a password. If you aren’t comfortable with that, just post the EtreCheck report here and other helpers can tell you exactly what files need to be deleted and how to do so. Recent versions of adware are adopting true malware techniques and I haven't had a chance to update EtreCheck. But the EtreCheck report will show exactly what state your system is in and then we can give you advice on how to remove the malware.



Disclaimer: Although EtreCheck is free, there are other links on my site that could give me some form of compensation, financial or otherwise.

Jun 5, 2016 4:24 PM in response to Belfast MacUser

Thank you so much for taking the time to help me Illaass, Linc Davis and Etresoft. I decided to use Etresoft as a first step because it seemed the least complicated option. I really appreciate your detailed instructions Linc Davis and if Etresoft doesn't work will follow them.


Etresoft identified all of the suspicion folders in my library and the launch daemons in that folder and one more piece of adware. I didn't want to delete them without being sure that that was the right thing to do. As Etresoft has advised, I am now posting the Etresoft results below and would welcome any advice about deleting - which I guess would include all of the "failed" folders and unknown files and the "not loaded" adware - all of which were recently installed but not by me.


Here are the results:


EtreCheck version: 2.9.12 (265)

Report generated 2016-06-06 00:13:35

Download EtreCheck from https://etrecheck.com

Runtime 1:31

Performance: Excellent


Click the [Support] links for help with non-Apple products.

Click the [Details] links for more information about that line.

Click the [Remove] links to remove adware.

Click the [Check files] link for help with unknown files.


Problem: No problem - just checking

Description:

Malware and adware



Hardware Information:

MacBook Pro (Retina, 15-inch, Mid 2015)

[Technical Specifications] - [User Guide] - [Warranty & Service]

MacBook Pro - model: MacBookPro11,5

1 2.8 GHz Intel Core i7 CPU: 4-core

16 GB RAM Not upgradeable

BANK 0/DIMM0

8 GB DDR3 1600 MHz ok

BANK 1/DIMM0

8 GB DDR3 1600 MHz ok

Bluetooth: Good - Handoff/Airdrop2 supported

Wireless: en0: 802.11 a/b/g/n/ac

Battery: Health = Normal - Cycle count = 43


Video Information:

AMD Radeon R9 M370X - VRAM: 2048 MB

Intel Iris Pro

Color LCD 2880 x 1800


System Software:

OS X El Capitan 10.11.4 (15E65) - Time since boot: about one day


Disk Information:

APPLE SSD SM1024G disk0 : (1 TB) (Solid State - TRIM: Yes)

EFI (disk0s1) <not mounted> : 210 MB

Recovery HD (disk0s3) <not mounted> [Recovery]: 650 MB

Macintosh HD (disk1) / : 999.32 GB (316.46 GB free)

Core Storage: disk0s2 999.70 GB Online


USB Information:

Apple Inc. Apple Internal Keyboard / Trackpad

Broadcom Corp. Bluetooth USB Host Controller


Firewire Information:

Seagate GoFlex Pro Mac 800mbit - 800mbit max

EFI (disk2s1) <not mounted> : 210 MB

Back up 1 (disk2s2) /Volumes/Back up 1 : 999.86 GB (474.31 GB free)


Thunderbolt Information:

Apple Inc. thunderbolt_bus

Apple Inc. Thunderbolt to FireWire Adapter


Gatekeeper:

Mac App Store and identified developers


Adware:

/Library/LaunchDaemons/com.previsiveUpd.plist

One adware file found.[Remove]


Unknown Files:

/Library/LaunchDaemons/com.Averroist.plist

/etc/Averroist.sh

/Library/LaunchDaemons/com.automysophobia.plist

/etc/automysophobia.sh

/Library/LaunchDaemons/com.bilingual.plist

/etc/bilingual.sh

/Library/LaunchDaemons/com.counterbarrage.plist

/etc/counterbarrage.sh

/Library/LaunchDaemons/com.crapaud.plist

/etc/crapaud.sh

/Library/LaunchDaemons/com.evilproof.plist

/etc/evilproof.sh

/Library/LaunchDaemons/com.inappositeness.plist

/etc/inappositeness.sh

/Library/LaunchDaemons/com.intervertebra.plist

/etc/intervertebra.sh

/Library/LaunchDaemons/com.mattedness.plist

/etc/mattedness.sh

/Library/LaunchDaemons/com.osphresis.plist

/etc/osphresis.sh

/Library/LaunchDaemons/com.pentite.plist

/etc/pentite.sh

/Library/LaunchDaemons/com.poilu.plist

/etc/poilu.sh

/Library/LaunchDaemons/com.savagism.plist

/etc/savagism.sh

/Library/LaunchDaemons/com.seerpaw.plist

/etc/seerpaw.sh

/Library/LaunchDaemons/com.solicitude.plist

/etc/solicitude.sh

/Library/LaunchDaemons/com.uschiwarkin.plist

/Library/LaunchDaemons/com.wintered.plist

/etc/wintered.sh

17 unknown files found.[Check files]


Kernel Extensions:

/Applications/Elgato Video Capture.app

[not loaded] com.elgato.driver.Pluto2 (1.1 - 2015-12-03) [Support]


/Applications/security software/DiskWarrior.app

[not loaded] com.alsoft.Preview (4.1 - 2012-11-18) [Support]


System Launch Agents:

[not loaded] 7 Apple tasks

[loaded] 150 Apple tasks

[running] 81 Apple tasks


System Launch Daemons:

[not loaded] 44 Apple tasks

[loaded] 147 Apple tasks

[running] 97 Apple tasks


Launch Agents:

[running] com.bitdefender.antivirusformac.plist (2016-05-04) [Support]


Launch Daemons:

[failed] com.Averroist.plist (2016-06-03) [Support]

[loaded] com.adobe.fpsaud.plist (2016-05-09) [Support]

[failed] com.automysophobia.plist (2016-06-01) [Support]

[failed] com.bilingual.plist (2016-06-02) [Support]

[loaded] com.bitdefender.AuthHelperTool.plist (2016-05-04) [Support]

[running] com.bitdefender.agent.plist (2016-06-01) [Support]

[loaded] com.bitdefender.upgrade.plist (2016-05-04) [Support]

[running] com.counterbarrage.plist (2016-06-05) [Support]

[failed] com.crapaud.plist (2016-06-04) [Support]

[failed] com.evilproof.plist (2016-06-04) [Support]

[failed] com.inappositeness.plist (2016-06-04) [Support]

[failed] com.intervertebra.plist (2016-06-03) [Support]

[loaded] com.macpaw.CleanMyMac3.Agent.plist (2016-05-22) [Support]

[running] com.malwarebytes.MBAMHelperTool.plist (2016-06-02) [Support]

[failed] com.mattedness.plist (2016-06-04) [Support]

[running] com.osphresis.plist (2016-06-05) [Support]

[failed] com.pentite.plist (2016-06-01) [Support]

[failed] com.poilu.plist (2016-06-04) [Support]

[not loaded] com.previsiveUpd.plist (2016-06-01) Adware! [Remove]

[running] com.savagism.plist (2016-06-05) [Support]

[failed] com.seerpaw.plist (2016-06-04) [Support]

[failed] com.solicitude.plist (2016-06-02) [Support]

[not loaded] com.uschiwarkin.plist (2016-05-22) [Support]

[failed] com.wintered.plist (2016-06-03) [Support]


User Launch Agents:

[loaded] com.macpaw.CleanMyMac3.Scheduler.plist (2016-06-01) [Support]


User Login Items:

CleanMyMac 3 Menu Application (/Applications/CleanMyMac 3.app/Contents/MacOS/CleanMyMac 3 Menu.app)

Launch Nikon Message Center 2 Application (/Applications/Nikon Software/Nikon Message Center 2/Nikon Message Center 2.app/Contents/SharedSupport/Launch Nikon Message Center 2.app)


Other Apps:

[running] /Library/uschiwarkin/uschiwarkin.app/Contents/MacOS/uschiwarkin

[running] com.bitdefender.CoreIssues

[running] com.bitdefender.Daemon

[running] com.bitdefender.UpdDaemon

[running] com.etresoft.EtreCheck.513312

[running] com.macpaw.CleanMyMac3.Menu.153632

[running] previsiveUpd.plist

[loaded] 387 Apple tasks

[running] 230 Apple tasks


Internet Plug-ins:

AmazonMP3DownloaderPlugin1017287: AmazonMP3DownloaderPlugin 1.0.17 (2012-11-18) [Support]

FlashPlayer-10.6: 21.0.0.242 - SDK 10.6 (2016-05-22) [Support]

Default Browser: 601 - SDK 10.11 (2016-03-12)

AdobePDFViewerNPAPI: 15.010.20060 - SDK 10.8 (2016-05-08) [Support]

AdobePDFViewer: 15.010.20060 - SDK 10.8 (2016-05-08) [Support]

QuickTime Plugin: 7.7.3 (2016-03-12)

Flash Player: 21.0.0.242 - SDK 10.6 (2016-05-22) [Support]

EPPEX Plugin: 10.0 (2013-09-13) [Support]

Flip4Mac WMV Plugin: 3.3.1.3 - SDK 10.8 (2014-09-12) [Support]

SharePointBrowserPlugin: 14.6.3 - SDK 10.6 (2016-04-26) [Support]

Silverlight: 5.1.41212.0 - SDK 10.6 (2016-05-08) [Support]


User internet Plug-ins:

Google Earth Web Plug-in: 7.1 (2015-12-03) [Support]


Safari Extensions:

AdBlock - BetaFish, Inc. - https://getadblock.com (2016-06-02)

Ghostery - GHOSTERY, Inc. - https://www.ghostery.com/ (2016-06-02)


3rd Party Preference Panes:

Flash Player (2016-05-09) [Support]

Flip4Mac WMV (2014-05-12) [Support]

Growl (2015-12-03) [Support]


Time Machine:

Skip System Files: NO

Auto backup: YES

Volumes being backed up:

Macintosh HD: Disk size: 999.32 GB Disk used: 682.87 GB

Destinations:

G-DRIVE ev [Local]

Total size: 999.86 GB

Total number of backups: 13

Oldest backup: 09/05/2016, 18:41

Last backup: 27/05/2016, 16:21

Size of backup disk: Too small

Backup size 999.86 GB < (Disk used 682.87 GB X 3)


My Passport for Mac [Local]

Total size: 2.00 TB

Total number of backups: 5

Oldest backup: 04/06/2016, 21:58

Last backup: 05/06/2016, 09:54

Size of backup disk: Too small

Backup size 2.00 TB < (Disk used 682.87 GB X 3)


Back up 2 [Local]

Total size: 999.86 GB

Total number of backups: 2

Oldest backup: 24/02/2014, 20:21

Last backup: 24/02/2014, 20:21

Size of backup disk: Too small

Backup size 999.86 GB < (Disk used 682.87 GB X 3)


Back up 1 [Local]

Total size: 999.86 GB

Total number of backups: 2

Oldest backup: 04/06/2014, 10:23

Last backup: 20/08/2014, 08:14

Size of backup disk: Too small

Backup size 999.86 GB < (Disk used 682.87 GB X 3)


Top Processes by CPU:

24% QuickLookUIHelper

15% WindowServer

15% Finder

4% kernel_task

3% hidd


Top Processes by Memory:

1.31 GB kernel_task

672 MB mds_stores

606 MB mdworker(23)

508 MB Finder

508 MB Safari


Virtual Memory Information:

2.86 GB Free RAM

13.00 GB Used RAM (2.64 GB Cached)

0 B Swap Used


Diagnostics Information:

Jun 4, 2016, 03:54:54 PM Self test - passed

Jun 4, 2016, 11:24:21 AM /Library/Logs/DiagnosticReports/Finder_2016-06-04-112421_[redacted].cpu_resourc e.diag [Details]

/System/Library/CoreServices/Finder.app/Contents/MacOS/Finder

Jun 4, 2016, 09:36:22 AM /Library/Logs/DiagnosticReports/mds_stores_2016-06-04-093622_[redacted].crash

/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/Metadat a.framework/Versions/A/Support/mds_stores

Jun 4, 2016, 09:35:45 AM /Library/Logs/DiagnosticReports/mds_stores_2016-06-04-093545_[redacted].crash

Jun 4, 2016, 09:35:22 AM /Library/Logs/DiagnosticReports/BDLDaemon_2016-06-04-093522_[redacted].cpu_reso urce.diag [Details]

/Library/Bitdefender/*/antivirus.bundle/BDLDaemon

Jun 4, 2016, 02:46:43 AM /Library/Logs/DiagnosticReports/BDLDaemon_2016-06-04-024643_[redacted].crash

Jun 3, 2016, 07:29:36 AM /Library/Logs/DiagnosticReports/com.apple.AmbientDisplayAgent_2016-06-03-072936 _[redacted].crash

/System/Library/PrivateFrameworks/AmbientDisplay.framework/Versions/A/XPCServic es/com.apple.AmbientDisplayAgent.xpc/Contents/MacOS/com.apple.AmbientDisplayAgen t

Jun 5, 2016 6:32 PM in response to Belfast MacUser

If you don't want to do what I suggested, see below for an alternative.

You may have installed ad-injection malware ("adware").

Don't use any kind of "anti-virus" or "anti-malware" product on a Mac. There is never a need for it, and relying on it for protection makes you more vulnerable to attack, not less.

Back up all data first.

If you're not already running the latest version of OS X, updating or upgrading in the App Store may cause the adware to be removed automatically. If you are already running the latest version, please log out or restart the computer. Again, some kinds of malware will be removed—not all. There is no such thing as automatic removal of all possible malware, either by OS X or by third-party software. That's why you can't rely on software to protect you.

If the malware is removed in your case, you'll still need to make changes to the way you use the computer to protect yourself from further attacks. Ask if you need guidance.

If the malware is not removed automatically, see below.

This easy procedure will detect any kind of adware that I know of. Deactivating it is a separate, and even easier, procedure.

Some legitimate software is ad-supported and may display ads in its own windows or in a web browser while it's running. That's not malware and it may not show up. Also, some websites carry intrusive popup ads that may be mistaken for adware.

If none of your web browsers is working well enough to carry out these instructions, restart the computer in safe mode. The malware will be disabled temporarily.

Step 1

Please triple-click the line below on this page to select it, then copy the text to the Clipboard by pressing the key combination command-C:

~/Library/LaunchAgents

In the Finder, select

Go Go to Folder...

from the menu bar and paste into the box that opens by pressing command-V. Press return. Either a folder named "LaunchAgents" will open, or you'll get a notice that the folder can't be found. If the folder isn't found, go to the next step.

If the folder does open, press the key combination command-2 to select list view, if it's not already selected. Please don't skip this step.

There should be a column in the Finder window headed Date Modified. Click that heading twice to sort the contents by date with the newest at the top. If necessary, enlarge the window so that all of the contents are showing.

Follow the instructions in this support article under the heading "Take a screenshot of a window." An image file with a name beginning in "Screen Shot" should be saved to the Desktop. Open the screenshot and make sure it's readable. If not, capture a smaller part of the screen showing only what needs to be shown.

Start a reply to this message. Drag the image file into the editing window to upload it. You can also include text in the reply.

Leave the folder open for now.

Step 2

Do as in Step 1 with this line:

/Library/LaunchAgents

The folder that may open will have the same name, but is not the same, as the one in Step 1. As in that step, the folder may not exist.

Step 3

Repeat with this line:

/Library/LaunchDaemons

This time the folder will be named "LaunchDaemons."

Step 4

Open the Safari preferences window and select the Extensions tab. If any extensions are listed, post a screenshot. If there are no extensions, or if you can't launch Safari, skip this step.

Step 5

If you use the Firefox or Chrome browser, open its extension list and do as in Step 4.

Jun 5, 2016 8:20 PM in response to Belfast MacUser

Hello again Belfast MacUser,

Unfortunately, recent types of Mac adware have crossed into true malware territory. You may find people here on Apple Support Communities splitting hairs and saying that "viruses" don't exist on the Mac. Technically, that may be true. But this recent crop of adware is very aggressive and actively resists being removed. It really isn't that much different than "true malware". So, I'm going to give you some instructions on how to proceed. Just realize that they probably won't work 100% the first time. It might take a couple of tries of doing the same or very similar procedures.


1) In the Finder, go to the "Go" menu and choose "Go to folder...".

2) In the "Go to the folder" dialog that appears, enter the following:

/Library/LaunchDaemons

and press enter.

3) Finder will open a new window. Select the following files in that window:

com.previsiveUpd.plist

com.Averroist.plist

com.automysophobia.plist

com.bilingual.plist

com.counterbarrage.plist

com.crapaud.plist

com.evilproof.plist

com.inappositeness.plist

com.intervertebra.plist

com.mattedness.plist

com.osphresis.plist

com.pentite.plist

com.poilu.plist

com.savagism.plist

com.seerpaw.plist

com.solicitude.plist

com.uschiwarkin.plist

com.wintered.plist

4) Drag them to the trash.

5) Restart your machine

6) Run another EtreCheck report and posts the report it generates.


My guess is that you will have to do some additional work to remove the "uschiwarkin" and "previsiveUpd" malware. You might even have one or two new ones. You will likely have to run some Terminal commands too. Just take it one step at a time.

Jun 6, 2016 2:45 AM in response to Linc Davis

Thank you Linc Davis once again for your very detailed advice.


General:


I had already backed up my data


I updated OSX software and the suspect files and folders remained.


I would be grateful for the guidance you refer to on the changes that I need to make to the way I use my computer to protect myself from future attacks once I have the malware removed.


I was not sure what you meant by your reference to web browsers as your instructions did not involve me using Safari apart from opening up Safari preferences, which did open, so I did not restart the computer in safe mode.


Step 1:


I treble clicked on the ~/Library/LaunchAgents line in your message but it didn’t activate so I couldn’t follow your instructions. None of the lines that I was supposed to click activated.


I went to the /Library/LaunchAgents folder - the only item in there was: com.bitdefender.antivirusformac.plist. I attach a screenshot.


I went to the Go > Go to Folder and pasted in Command-V and pressed return and was told “The folder can’t be found” . A search for the folder “~/Library/LaunchAgents” had the same response.


Step 2:


I had already been to /Library/Launch Agents in Step 1 and the screenshot is attached.


Step 3:


I went to /Library/LaunchDaemons and I attach a screenshot. The relevant ones are the ones downloaded since 22 May 2016 although I did not notice a problem until 31 May 2016 (apart from CleanmyMac, Bitdefender and Malwarebytes).


Step 3A:


I went to /Library and I attach a screenshot. This is because some of the suspect folders have been downloaded into the Library folder and I thought this may be relevant for you to know.


Step 4:


I went to Safari preferences and selected the Extensions tab. I attach a screenshot.


Step 5:


I don’t use Firefox or Chrome browsers.


User uploaded fileUser uploaded file




User uploaded file

User uploaded file

Jun 6, 2016 2:51 AM in response to etresoft

I was planning to attach the other files here but have not been allowed to do so. Even after refreshing the page and logging out and in again I get the message "Your content could not be saved due to an error". I will try again later. The missing screenshots show a lot of suspect folders in the Library folder whose names are also to be found in the /Library/LaunchDaemons folder. The only extension in Safari Preferences are Adblocker and Ghostery.

Jun 7, 2016 1:20 AM in response to Belfast MacUser

Hhello again Belfast MacUser,

That's just the flaky Apple web forum software. The only files you really need to delete are in /Library/LaunchDaemons. Those are the scripts that automatically run the malware. In most cases, removing the files in /Library/LaunchDaemons and restarting is all you need to do. However, I wouldn't be surprised if you do have to do more. Malware has gotten noticeably more agressive just in the last two weeks. Just so you know, this will take multiple rounds.

Jun 6, 2016 12:38 PM in response to Belfast MacUser

A

You installed one or more variants of the "VSearch" trojan. Please inactivate them as follows. This procedure will leave a few small files behind, but they have no effect, and trying to remove them all would be a lot more trouble than it's worth.

This malware has many variants. Anyone else finding this comment should not expect it to be applicable.

Back up all data before proceeding.

Step 1

The VSearch variant that you have regenerates itself if you try to delete it while it's running. To remove it, you must first start up in safe mode to disable the malware temporarily.

Note: If FileVault is enabled in OS X 10.9 or earlier, or if a firmware password is set, or if the startup volume is a software RAID, you can’t do this. Ask for other instructions.

Step 2

While running in safe mode, load this web page and then triple-click anywhere in the line below to select it:

/Library/LaunchDaemons

In the Finder, select

Go Go to Folder...

from the menu bar and paste into the box that opens by pressing command-V. You may not see what you pasted because a line break is included. Press return.

A folder named "LaunchDaemons" will open. Press the key combination command-2 to select list view, if it's not already selected.

There should be a column in the Finder window headed Date Modified. Click that heading twice to sort the contents by date with the newest at the top. Please don't skip this step. Files that belong to an instance of VSearch will have the same modification time to within a few minutes, so they will be clustered together when you sort the folder this way, making them easy to identify.

Step 3

Inside the LaunchDaemons folder, there may be one or more files with a name of this form:

com.apple.something.plist

where something is a random, meaningless string of letters, different in every case.

Note that the name consists of four words separated by periods. Typical examples:

com.apple.builins.plist

com.apple.cereng.plist

com.apple.nysgar.plist

There may also be one or more items with a name of this form:

com.something.plist

Again, something is a random, meaningless string—not necessarily the same one that appears in any of the other file names.

These names consist of three words separated by periods. Typical examples:

com.semifasciaUpd.plist

com.ubuiling.plist

Drag all such items to the Trash. You may be prompted for your administrator login password.

Restart the computer and empty the Trash.

If you're not sure whether a file is part of the malware, order the folder contents by modification date, not by name. The malware files will be clustered together. There could be more than one such cluster. A file dated far in the past is not part of the malware. A file dated right in the middle of an obviously malicious cluster is almost certainly also malicious.

If the files come back after you have deleted them, or if they're replaced by others with similar names, then either you didn't start up in safe mode or you didn't get all of them. Go back to Step 1 and try again.

Step 4

Reset the home page in each of your web browsers, if it was changed. In Safari, first load the home page you want, then select

Safari Preferences... General

and click

Set to Current Page

If you use the Firefox and/or Chrome web browser, remove any extensions or add-ons that you don't know you need. If in doubt, remove all of them.

Step 5

The malware enables web proxy discovery in the network settings. If you know that the setting was already enabled for a good reason, skip this step. Otherwise you should revert the change.

Open the Network pane in System Preferences. If there is a closed padlock icon in the lower left corner of the window, click it and authenticate to unlock the settings. Click the Advanced button, then select Proxies in the sheet that drops down. Uncheck the box marked Auto Proxy Discovery if it's checked. Click OK, then Apply.

Step 6

This step is optional. Open the Users & Groups pane in System Preferences and click the lock icon to unlock the settings. In the list of users, there may be one or more with random names that were added by the malware. You can delete those users. If you're not sure whether a user is legitimate, don't delete it.

B

"CleanMyMac" is a scam and a common cause of instability and poor performance. Depending on what version you have, the developer's instructions may not completely remove it. Please follow those instructions, then do as below.

Back up all data before proceeding.

Triple-click anywhere in the line below on this page to select it:

/Library/LaunchDaemons/com.macpaw.CleanMyMac3.Agent.plist

Right-click or control-click the highlighted line and select

Services Reveal in Finder (or just Reveal)

from the contextual menu.* A folder may open with an item selected. If it does, move the selected item to the Trash. You may be prompted for your administrator login password.

Repeat with this line:

/Library/PrivilegedHelperTools/com.macpaw.CleanMyMac3.Agent

Restart the computer and empty the Trash.

You may also have to remove one or more of these items in the same way:

~/Library/LaunchAgents/com.macpaw.CleanMyMac.helperTool.plist

~/Library/LaunchAgents/com.macpaw.CleanMyMac.volumeWatcher.plist

~/Library/LaunchAgents/com.macpaw.CleanMyMac3.Scheduler.plist

Never again install "CleanMyMac" or anything like it.

*If you don't see the contextual menu item, copy the selected text to the Clipboard by pressing the key combination command-C. In the Finder, select

Go Go to Folder...

from the menu bar and paste into the box that opens by pressing command-V. You may not see what you pasted because a line break is included. Press return.

C

Please remove "BitDefender Antivirus" by following the instructions on this page. I can't vouch for the effectiveness of those instructions. If they don't work, refer to the developer for more information.

Back up all data before making any changes. Never install any "anti-virus" or "anti-malware" software again.

D

The "Malwarebytes" product failed to remove the malware. That's what you should always expect from such products: failure. I suggest that you remove it according to its developer's instructions and never install any "anti-malware" or "anti-virus" software again. Relying on such software for your security is a dangerous mistake. Security lies in safe computing practices, not in software. Ask if you want guidance.

Jun 6, 2016 12:59 PM in response to Linc Davis

Thank you for your advice again Linc Davis.


I have followed all of your instructions which were very easy to follow. The deleted files in the Launch Daemon folder in the Library folder did not return after I restarted the computer. I would be very grateful if you could answer 3 more queries:


1. Step 5: I checked twice in Network-Advanced-Proxies. Both times I opened the window Auto Proxy Discovery was unchecked. The first time I opened the window Use Passive FTP mode was unchecked. Within 3 minutes the box was checked and the “Bypass proxy settings for these Hosts & Domains:” now included “*.local, 169.254/16”. I have screen shots of both these windows if you need them. I presume that I should change these settings. If that is right is there anything else that created these changes that I need to delete as well?


2. Step 6: Users and groups. I have two accounts and an account named "Guest User" than appeared at around the time of the viruses. I thought that this was related to "Find my Mac" after googling to find out but after Step 6 I checked and found that my Find my Mac is unchecked. I am unable to delete this. Could you advise me how to do this please?


3. Should I delete all the folders in my Library folder that share names with the deleted plist files? (The plist files had names in the com.X.plist format. These files use the same names for X but are just called X). They were created at the same time and are System read and write only. I attach a screenshot in case it helps. User uploaded file

Jun 7, 2016 8:49 AM in response to etresoft

Etresoft,


I posted a message yesterday to thank you for your advice and programme but today I see that it did not appear.


It is a great programme and with fun graphics. Thank you.


Today I have another query however. Last night I cleared out all of the identified suspect folders recommended by Etresoft and Linc Davies and this morning everything was still clear. Within an hour or so I ran MalwareBytes and it identified a list of adware files that had been created this morning. I deleted these. I ran Etresoft and while your devil and masked figure both appeared and malware/adware was identified, your report did not list them as it had before.


Do you have any advice as to how I might identify the remaining files in my hard drive that are continuing to create the adware?

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Pirrit - how to custom restore your data without infecting an erased MacBookPro?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.