it started with identity fraud of our family's bank accounts

I have had this same issue for weeks, and it started with identity fraud of our family's bank accounts. This is related to the Adobe installer, Flash or any PC translating software that you may or may not have intentionally agreed to...it allows another user to enter your Mac as a root user (Persistent) and execute false certificates, scripting and an overall restructuring of your machine so that every effort to erase and reinstall is pointed to a Mac OSX legacy configuration that allows this outside user to remain connected and able to modify permissions. Over the past week I've had my permissions and settings changed via script, my chron settings altered and now all logs are encrypted. I have pages of Unix screen shots showing this activity, and our home router, iPad, phones and even our cars have been accessed by similar outside programs - all showing our data moving out to servers in foreign countries. The consistent link seems to be that they require PCs to view anything or receive - the few logs I was able to recover show data going to IP addresses at Private LLC server hosting in Florida that is linked to child **** sites, and also to bank servers directed to Russia. The entirety of our household data went to a major server farm in Germany (with alleged ties to the Russian government). Why they want this is beyond me, but I am noticing a lot of MAC users complaining of similar issues to what we've dealt with since Feb/March. When OSX is reinstalled (after erasing all), the default profile will have nonsensical pointers to sub OSX images - to ensure that you see and use a variant operating system with different permissions. I recognize this is a common configuration, but not when OSX recovery images are available in 3-5 different sub folders after an erase/partition and reinstall. First Aid seems to recognize and fix the directory or hierarchy issues, but if it's really successful, your hard disc will be suddenly disabled and you are left with no option but to reformat/partition. The Recovery Image (below) is left in tact - as is the OSX Base. Once reformatting occurs (again), the default file system installed is identical to the one above - complete with Keychain and MDNS service plists that redirect all installs to a configuration allowing foreign IP addresses and users to authenticate as root and conduct activities on the primary user's account (you) even when your computer and wifi are offline or shut down.


The background Sys Admin/Root user is able to script manipulate and revert settings on the fly, and has accessed my keyboard, camera and sound via Siri and other programs (if use elite or rev411, you can see these hidden processes running in your Activity Monitor, even if Siri is disabled on your user preference pane). If you open a Terminal, common Unix commands (find, ls) may or may not be recognizable, even if you are executing in root, and even then, you are likely seeing only directories or var/ that they allocate for this purpose (I had about a week of success and screen shots where I really captured the hidden file directories, IPs and logs until this was blocked). You may also see that Unix helper prefs are enabled only in English, Russian and Chinese....


If all of this sounds insane, I don't blame anyone and I've noticed Apple replies are abject denials (but keep sending those weekly 'updates' and 'bug fixes'). We can't believe it either - but our children's photos are now gone, our bank account is actively being hacked through users who know our new account numbers and passwords (daily) and our home ATT router is regularly redirected to outside IP addresses correlated to IP addresses used to move data from home computers. Apple refuses to acknowledge what may be a massive hack of personal data from all devices. Best of luck to everyone - really - if anyone has a solution to this, I'd love to hear it (as soon as possible).


<Re-Titled by Host>

Posted on Apr 28, 2017 11:06 AM

Reply
17 replies

Apr 28, 2017 12:21 PM in response to CALev2017

To condense this down to where I see actual issues:

This is related to the Adobe installer, Flash or any PC translating software that you may or may not have intentionally agreed to…it allows another user to enter your Mac as a root user (Persistent) and execute false certificates,…

The real Adobe Flash player will never, ever do such a thing. I would have to presume you, or someone else in your household fell for the prolific scam on the web of a rogue site claiming you need to download and install a Flash update (or a Java update, or a video codec) to view or use their site. Without fail, literally 100% of the time, such installers directly from an unknown web site is malware, and not what they say it is. The real Adobe Flash Player is available from one, and one place only - Adobe. Java (the latest version), only from Oracle. For Mac Java apps that require the older Java 6, only from Apple.

Once reformatting occurs (again), the default file system installed is identical to the one above - complete with Keychain and MDNS service plists that redirect all installs to a configuration allowing foreign IP addresses and users to authenticate as root and conduct activities on the primary user's account (you) even when your computer and wifi are offline or shut down.

If you installed nothing else after reinstalling the Mac OS on an erased drive, and did not restore any type of backup, that is impossible. This appears to be your real problem.

our home ATT router is regularly redirected to outside IP addresses correlated to IP addresses used to move data from home computers. Apple refuses to acknowledge what may be a massive hack of personal data from all devices.

It's your router that's been hacked, not your Mac. Notice that the problem affects all devices using the Internet.


Unplug the Internet connection from the router so no one can see what you're doing. Before bothering with any of the rest of the following, if this is an old router (like more than 8-10 years old), start by throwing it away and get a new one. If not, continue. Though even if you do get a new router, some of the following applies. Particularly admin password entry to the router's settings, and remote access.


Reset the router. Typically, this involves holding in a small recessed button for 5 seconds or so. Check your manual for the specifics. This puts all settings on the router back to factory defaults.


For a very long time, router manufacturers used simple admin entry, such as "admin" for the user name, and blank for the password. Or, reversed as no admin user name and "admin" as the password. This makes it incredibly easy for anyone within range of your router to break into it. All they have to do is cruise the neighborhood, type 192.168.0.1 into their laptop's web browser, and wait for a router to respond. Then try the various easy default admin/password to see if they can get in. Once in, it doesn't matter how complex your wi-fi password is, they can see it, copy it, and then use it to login to your network.


First thing to do is make sure no one can see what you're changing. So don't just unplug the router's Internet cable, but go into the router's wireless settings and disable all wireless broadcasting. Anyone who may be illegally sharing your bandwidth will now be cut off.


Next is to make your admin access to the router's settings difficult for anyone but you to get past. If it doesn't already have a complex password, give it one. DO NOT use simple things like applepie, password, 1234. It needs to be something that can't be easily guessed. Such as Rby4UV9eFe19u4zA. Make a note of this somewhere so you don't forget it. It you do, you'll have to do a reset on the router again to get back into it.


Since someone may already know your wireless passwords, change those to something equally complex as you did for the admin password. You'll need to update your devices later to login with the new passwords you create. Make sure wireless security is WPA2. If this is not an available option, throw the router away immediately and replace it. Do not choose a setting such as WPA2/WPA/WEP, where all three are used at once. WEP can be hacked in less than a minute with the right tools. It's totally useless. If you have any device that cannot connect to WPA2, turn WPA on. If it can't access that either, replace the device. Never use WEP - ever.


Lastly, look for any remote access settings and turn them off. There is no need for these to be on for just about any typical user, and is how crooks get into routers remotely. Once in, they can create all the redirects they want.


Now, with all settings and passwords changed, turn wi-fi back on. Only you should know how to reconnect to your router, no one should be able to easily get in through the admin page, and remote access will be disabled.

Apr 28, 2017 2:01 PM in response to Ferd II

Entirely possible. But kind of difficult to get. At least in the U.S. since it's currently targeting European users. You still have to get an email with the malware .zip attachment. Then you have to run it. Then you have to be silly enough to click the Update All button to actually infect your Mac.


Not sure how the author of piece missed the obvious way to shut the process down - Force Quit. He or she wrote:

The victim is barred from accessing any windows or using their machine in any way until they relent, enter the password and allow the malware to finish installing.

"In any way"? So this person is saying I can't even unplug the computer and kill power to it? Not that it's necessary to be that drastic. There are at least a few ways out of the installation. None of them difficult.


Being a signed app, it won't be long before Apple pulls the credentials and permanently blocks the malware. They're fast when it comes to real threats.

Apr 28, 2017 2:05 PM in response to KiltedTim

More on this here.

[...]

Anti-virus protection is now starting to detect it, but removal is likely to be a tougher proposition: Malwarebytes’ Anti-Malware should now detect it reliably, and other products should follow. It appears unlikely that the recent update to Apple’s MRT provides any protection from OSX/Dok. Apple has today revoked the developer certificate used to sign the installer Dokument.app, so that should be blocked by Gatekeeper.

[...]

Apr 28, 2017 2:13 PM in response to CALev2017

Can you supply some facts to back up your claims. Things like the following (all from Terminal):


set


ls -lae@0 /var/log


ls -lae@0 /


The first command will tell us what your path and other shell variables are. The second and third will show us what the contents are of your /var/log and / folder are. How are you determining that your files are being shipped to servers in foreign countries.


Please provide some details so we know you're not just pulling our leg.


Good luck...

Apr 29, 2017 4:54 PM in response to CALev2017

1. Is English your first language?
You use words, but it the syntax is very strange...


2. You've listed many highly technical and troubleshooting methods which should imply that you know what to do if you screw up and accidentally install a virus.


3. Why wasn't your first instinct to backup/wipe your computer and start over fresh on a known safe internet connection?


4. Where is the proof of all of your claims?

If you have such evidence of data exfiltration, why did you not just unplug everything and reference step three above?


5. Where are your backups?
If you loose data due to a malicious program or disk failure, that's your fault, not Apple's.


6. I've seen posts like this before where it's the NSA or other 3-letter international government spy agency has hacked everything in that person's house making it a living nightmare. However, some of what you said makes you sound insane, the other half of what is listed is impossible, impractical, or only works in the movies.

Apr 30, 2017 7:52 AM in response to ishrugged

The uppercase O lists the "flags" associated with a file (not all files have "flags" and if they don't they will simply show a "-" in the ls listing -- look close and you will see a difference), the lowercase o lists a "long" format without the group id (read the man page). These are not the same thing. For example:


MacBook:CoreServices xxx$ pwd

/System/Library/CoreServices

Bobs-10p14-yyy-MacBook:CoreServices bobf$ ls -lae@o | head

total 3472

drwxr-xr-x 160 root 5440 Apr 29 13:23 .

drwxr-xr-x 92 root 3128 Apr 12 19:38 ..

-rw-r--r--@ 1 root 653 Apr 12 17:33 .disk_label

com.apple.FinderInfo 32

-rw-r--r--@ 1 root 2621 Apr 12 17:33 .disk_label_2x

com.apple.FinderInfo 32

drwxr-xr-x 3 root 102 Jan 18 19:10 AOS.bundle

drwxr-xr-x 3 root 102 Feb 14 19:38 AVB Audio Configuration.app

drwxr-xr-x 3 root 102 Feb 6 18:56 AddPrinter.app

MacBook:CoreServices xxx$ ls -lae@O | head

total 3472

drwxr-xr-x 160 root wheel restricted 5440 Apr 29 13:23 .

drwxr-xr-x 92 root wheel restricted 3128 Apr 12 19:38 ..

-rw-r--r--@ 1 root wheel restricted,hidden 653 Apr 12 17:33 .disk_label

com.apple.FinderInfo 32

-rw-r--r--@ 1 root wheel restricted,hidden 2621 Apr 12 17:33 .disk_label_2x

com.apple.FinderInfo 32

drwxr-xr-x 3 root wheel restricted 102 Jan 18 19:10 AOS.bundle

drwxr-xr-x 3 root wheel restricted 102 Feb 14 19:38 AVB Audio Configuration.app

drwxr-xr-x 3 root wheel restricted 102 Feb 6 18:56 AddPrinter.app

Apr 30, 2017 8:14 AM in response to Csound1

You must have been watching a James Bond movie last night 😉


I hope the OP does give some facts to back up his system's current state, but lack of a response only makes me think that his situation is not as serious as he seems to think it is, or at least the real causes of what they are seeing is not what they think it is.


Time will tell...

Apr 30, 2017 11:23 AM in response to ishrugged

No problem - appreciate you pointing out the 0 vs O - hard to see on the font for these web pages, and it's always good to document incorrect statements in these threads. Would really be nice if you could go back later and edit your comments, but you only have 15 minutes to do that (I think it's 15 minutes anyway). After that the only thing to do is either correct your posting with another posting or have someone else point it out if you don't notice.


I'm like you, in that I learn all kinds of stuff on these discussion forums that I can use on my own computer. Really is the best sort of learning when you learn by seeing others perspectives and points of view - hard to be perfectly objective about yourself so input from others is always welcome. Sometimes, you may not agree, but that doesn't make what others say invalid - just a different take on any given situation.


Good luck...

May 1, 2017 7:04 PM in response to Ferd II

YES - thank you for this information and the link to the virus/malware info.

Kurt - you are correct, but the issues were significantly beyond our control to 'fix' as settings in both the computer, home router and all iOS devices reverted even after re-setting. As the link to the virus indicates, the first thing that occurs is significant change to shell, user permissions and basic start-up/account scripts.


When I launched the Activity Monitor (due to repeated Kernal Panics), I noticed that Launchd, _mdsetupuser and accounted were taking too much CPU and Network time when the machine was in sleep mode. Activities like Siri, Audio/Video inputs and photos were being actively managed by the 'Sys Admin' or 'Root Usr' or a '_Remotehost.' I am not trained in computer science (sorry if I sound foreign LOL), but I was surprised by so many posts to Apple these past and would never download anything that wasn't from the developer website (i.e. Adobe). The monthly/automatic updates function allows ports and even network utilities to remain in persistent 'alive' states that can be exploited.


Another way to identify if a computer is infected is to view the keychain activity, and 'root certificates.' You'll see a list of Certificates from Europe, Eastern Europe and even Apple Developer certs....these are not defaults (based on reloading El Capitan from a boot disc).


Sadly, the only way I found to fix all of this is to reinstall El Capitan from an external hard drive (downloaded through Apple). When I tried to use Disk Utility to format the hard drive for this process, my computer installed default files that would result in the directory structure and permissions of the infected system. So ERASE it all...start over, and then use an outside/secure computer to re-set all passwords, making sure all spotlight, security, bluetooth, Thunderbolt and other options for sharing or connections to outside computers are secure.


Thanks again....

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

it started with identity fraud of our family's bank accounts

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.