it started with identity fraud of our family's bank accounts
I have had this same issue for weeks, and it started with identity fraud of our family's bank accounts. This is related to the Adobe installer, Flash or any PC translating software that you may or may not have intentionally agreed to...it allows another user to enter your Mac as a root user (Persistent) and execute false certificates, scripting and an overall restructuring of your machine so that every effort to erase and reinstall is pointed to a Mac OSX legacy configuration that allows this outside user to remain connected and able to modify permissions. Over the past week I've had my permissions and settings changed via script, my chron settings altered and now all logs are encrypted. I have pages of Unix screen shots showing this activity, and our home router, iPad, phones and even our cars have been accessed by similar outside programs - all showing our data moving out to servers in foreign countries. The consistent link seems to be that they require PCs to view anything or receive - the few logs I was able to recover show data going to IP addresses at Private LLC server hosting in Florida that is linked to child **** sites, and also to bank servers directed to Russia. The entirety of our household data went to a major server farm in Germany (with alleged ties to the Russian government). Why they want this is beyond me, but I am noticing a lot of MAC users complaining of similar issues to what we've dealt with since Feb/March. When OSX is reinstalled (after erasing all), the default profile will have nonsensical pointers to sub OSX images - to ensure that you see and use a variant operating system with different permissions. I recognize this is a common configuration, but not when OSX recovery images are available in 3-5 different sub folders after an erase/partition and reinstall. First Aid seems to recognize and fix the directory or hierarchy issues, but if it's really successful, your hard disc will be suddenly disabled and you are left with no option but to reformat/partition. The Recovery Image (below) is left in tact - as is the OSX Base. Once reformatting occurs (again), the default file system installed is identical to the one above - complete with Keychain and MDNS service plists that redirect all installs to a configuration allowing foreign IP addresses and users to authenticate as root and conduct activities on the primary user's account (you) even when your computer and wifi are offline or shut down.
The background Sys Admin/Root user is able to script manipulate and revert settings on the fly, and has accessed my keyboard, camera and sound via Siri and other programs (if use elite or rev411, you can see these hidden processes running in your Activity Monitor, even if Siri is disabled on your user preference pane). If you open a Terminal, common Unix commands (find, ls) may or may not be recognizable, even if you are executing in root, and even then, you are likely seeing only directories or var/ that they allocate for this purpose (I had about a week of success and screen shots where I really captured the hidden file directories, IPs and logs until this was blocked). You may also see that Unix helper prefs are enabled only in English, Russian and Chinese....
If all of this sounds insane, I don't blame anyone and I've noticed Apple replies are abject denials (but keep sending those weekly 'updates' and 'bug fixes'). We can't believe it either - but our children's photos are now gone, our bank account is actively being hacked through users who know our new account numbers and passwords (daily) and our home ATT router is regularly redirected to outside IP addresses correlated to IP addresses used to move data from home computers. Apple refuses to acknowledge what may be a massive hack of personal data from all devices. Best of luck to everyone - really - if anyone has a solution to this, I'd love to hear it (as soon as possible).
<Re-Titled by Host>