RED ERROR MESSAGE IN LOG MacBook Pro

Hi,

I keep getting this red error message below on the log of my MacBook Pro.


panne 17:17:30.944519+0200 com.apple.WebKit.WebContent NSSecureCoding allowed classes list contains [NSObject class], which bypasses security by allowing any Objective-C class to be implicitly decoded. Consider reducing the scope of allowed classes during decoding by listing only the classes you expect to decode, or a more specific base class than NSObject.


Can some one let me know please what this is please ?

I am concerned because I think that my Mac was hacked and I just reinstalled the lates macOS Catalina vers 10.15.4 and this message keeps coming back.


Thanks,


MacBook Air 13", OS X 10.11

Publiée le 25 avr. 2020 à 08h54

Répondre
13 réponses

Le 25 avr. 2020 à 11h06 en réponse à go-vincent

Alright, so that message is basically displayed on your login screen, right?


It would seem according to my researches that NSSecureCoding is a protocol used in the Apple programming language Swift.

It seems that it's used in the creation process of daemons and agents (basically, those are files running in the background of your Mac and executing things -some are good, some are bad-).


Anyway, if your Mac actually displays this message, I can conclude the machine is aware of what's happening.


  • Now, could you please run a diagnostic to know if something is wrong on your computer? Please take a look at this link. Once it's done, please tell us if there are some errors showing up and their references (a code made from letters and numbers).
  • Then, please download EtreCheck which will make a report than you can copy and paste here for us to see if there's something weird running in the background for example.


Waiting for your return on this.




Le 26 avr. 2020 à 06h17 en réponse à go-vincent

Alright, glad you did the everything possible to attack your providers. That is definitely a dangerous case for you and your company. I hope the answer of Microsoft will be on your side.


It's okay if you deleted the key knowing it wasn't useful anymore. You got it : the goal of keeping it written somewhere was to save you from forgetting it in case you needed it one day.


In the "private" folder on your Mac (MacintoshHD/private/etc/wfs/directory), are stored important files, daemons and agents for your machine. It's basically the system32 of Macintosh computers. In "etc", you find data files for system use, configurations, etc. "wfs" sounds to me like "Windows File System" but I'm not so sure about that. It seems like this term is mentioned in this Apple PDF so I guess it's related to networking which is relevant to what you found yourself. 👍

But as you're on a French board here, I doubt someone will be able to answer you in your language.

Le 25 avr. 2020 à 10h28 en réponse à Zer0one7

Our company got hacked last week via Microsoft Azur cloud and I am the only one in the company that uses Microsoft products. We are sure that it's via Microsoft Azure because we have the IP address that connected on our AWS server 104.42.44.150.

After doing some research on the web it looks like it's not that complicated to hack via Microsoft Azur. Please see: https://www.securitynewspaper.com/2019/08/08/simple-reasons-why-the-microsoft-azure-cloud-isnt-secure/

Le 25 avr. 2020 à 11h31 en réponse à Zer0one7

Hi there,


Thanks you so much for your help !!! this is really appreciated.


So I did run the diagnostic above and the result is that there is not hardware issue.

Question: Would my question be software related ?


FYI, Today I have already reinstalled Catalina vers 10.15.4. I did this because yesterday when I installed the latest update, the screen became red around the apple for a few seconds so I decided to reinstall the couple Catalina version this morning.

Also when I connected to my back account 4 days ago I received an alert that I should active the firewall.


Again thanks a lot for your help.


Le 25 avr. 2020 à 14h17 en réponse à Zer0one7

Thanks so much for all of your recommendation.

So I did what you recommended. After rebooting the Mac, I had to ajuste the light of the screen and the "Key chain" (trousseau in French) interface opened. This might be due to the fact that I changed the session setting earlier and it came back to it's original setting.

However while glancing over the passwords I noticed that there is something weird.

One of the key name is: hpfc3fdbdc8c4e. It doesn't look normal to me. Can I delete it? Please see pix below. THANK YOU for your help.

Le 25 avr. 2020 à 14h28 en réponse à go-vincent

If you ask me, I’d tell you not to delete it if this is your working station. It seems like it was created way before your hacking problem and it is a network password, probably used to connect yourself to a network at work.


If it’s your personal Mac and the password doesn’t mean anything to you, then delete it but don’t forget to copy it somewhere you can find it back if by chance you would need it again in the future.

Le 25 avr. 2020 à 14h57 en réponse à Zer0one7

Additional facts:

  • It's the second time that this happened to us. Each time the hacker managed to steel keys even though we are very cautious.

First time he did a set-up via CloudFlare and this time via Microsoft Azure. Each time he attacks AWS SES service and sends SPAM out using our domaine name.

  • The key has a logo in front. This logo looks like the Microsoft logo if I compare it to Microsoft Office credential and we go hacked via Microsoft Azure.
  • I have suspicious about who is doing it because our problems started a few weeks after we started working with them which is November last year.
  • In our organisation we don't use a network, so there is no need for this access key I think.
  • It's a good idea to copy it. I can see how to copy it however I don't know how to store it and where. Would you know?
  • Thank you. thank you ...

Le 26 avr. 2020 à 00h19 en réponse à go-vincent

Well, I think the time has come to change your cloud provider for something more secure. Did you talk about it to your boss? What does he think? I mean, if you guys get hacked every now and then, that could really become a problem for your company.

Now that you know how he attacks you, then talk about it to the Microsoft technical service. If they can't assure you that you won't get hacked again, knowing how you have been attacked, then leave.


For your passwords and secure notes, you can download LastPass. It's a free app (with optional features you can pay to get) and it's basically a password manager that generates complex passwords for you to use, store them for you and suggest them each time you have to use them on a website. Plus, you can save some secure notes to which you'll be the only one to have access to (via your master password which gives you access to everything LastPass related).

There's even a double authentification process for more security added.

Le 26 avr. 2020 à 01h00 en réponse à Zer0one7

Thanks, thanks for all these details.


Indeed I have opened two infringement cases. One against CloudFlare that stoped the server of the hacker right away and one against Microsoft Azure. Microsoft Azure hasn't come back yet. In the infringement request we shared with them 1) the evidence that we got hacked via the Azure cloud, 2) requested that they share any additional information that they might have about this customer 3) that this caused damages to our company, 4) that they need to stop the activity of this customer ASAP to ensure that this hacker doesn't start again via M.Azure. A quick action on their behalf is vital and essential to limit any future damages that this hacker might cause to our organisation.

This request was official sent to Microsoft infringement legal department April 24 14:23 CET. As of now I have not received any response, confirmation or any communication from them.

CloudFlare was much more reactive. They came back right away and acted accordingly within a day by stopping the server of the Hacker.


Regarding the unnamed key that sits in my keychain, I noticed that there is a fonction go (aller) when you click on the key. When I click on it, It opened the MacintoshHD/private/etc/wfs/directory and the message was that the server is not available and I have deleted the key.


Unfortunately I didn't see your response before deleting the key because I didn't get an email notifying me that a new message arrived. :-(


The WFS directory is an other ticket that I did open earlier to better understand what it does. I understand that you can develop a background App, push it on any PC and connect to it via an unsecured connection http via the WFS directory. Do you have the same understanding ?


Thanks !

Le 26 avr. 2020 à 07h56 en réponse à go-vincent

Microsoft products aren't bad at all. For now, you and your company just have to wait MS answer to your call. I can only hope that if they are faulty, you get your due. After all, it's all that matters. 🙂


Thank you for the evaluation, I appreciate it. 👍


Wish you all the best also. Take care of yourself and your family. ☀️

Cette discussion a été fermée par le système ou l’équipe de la communauté. Vous pouvez voter pour les publications que vous jugez utiles ou effectuer des recherches dans la communauté pour trouver des réponses supplémentaires.

RED ERROR MESSAGE IN LOG MacBook Pro

Bienvenue dans la Communauté d’assistance Apple
Un forum où les clients Apple s’entraident avec leurs produits. Faites vos premiers pas avec votre compte Apple.