Thomas Reeds Auskunft über diesen Trojaner:
Malwarebytes Anti-Malware for Mac should have detected it as of last night some time, probably very late for European users.
Unfortunately, this malware is very invasive, and makes changes that cannot easily be reversed. It makes a change to the sudoers file that would allow any software the user runs to have root permissions without the need for a password. It installs a root certificate that shouldn't be trusted but is. It installs a Tor launch agent, which is legit and thus shouldn't be identified as malware, but is probably not wanted by most victims of this malware. It installs tens of thousands of files consisting of developer tools, open source binaries, etc... things like homebrew, tor and socat.
I'd be reluctant to tell someone to manually fix all these things. A mistake editing the sudoers file can have serious - and hard-to-fix - repercussions. Deleting the wrong certificate could also be bad. Removing the Tor launch agent is relatively risk-free, but there's virtually no way to remove the tens of thousands of command-line utility-related files.
My recommendation would be remove the essential parts of the malware in the short term - which Malwarebytes can do, but it's also easy enough to do with EtreCheck or even manually. Once it's gone, you've got some breathing room. The other modifications need to be undone, but the risk is not immediate.
Next, as soon as is possible, I'd erase the hard drive and restore from a backup made prior to the infection. If that's not possible, erase and reinstall, then restore documents only from backup.
If a user really wants to avoid restoring for some reason, they'll need to either be knowledgeable enough to know how to undo the other changes, or they'll need an expert to help them.