Scammer takes control of iMac through infected Canon printer driver

I have problems with the scanner part of my Canon printer. I opened up what I believed to be Canon website. Cutting a long story short the ‘engineer’ told me that the scanner driver had been infected by spyware. After. Providing personal details, but before my bank details I realised that the engineer had sent a small program to update driver, which allowed him to take control of the computer (2013 iMac). When the subject of money came up I noticed that the site was not secure and when I tried to shutdown the cursor immediately moved to prevent that selection. To avoid anything further happening I disconnected the power supply


[Re-Titled by Moderator]

Original Title: Almost scammed

Earlier displays & monitors

Posted on Sep 3, 2025 4:32 AM

Reply
Question marked as Top-ranking reply

Posted on Sep 3, 2025 8:39 AM

Without knowing exactly what the criminal did (which is probably an impossible task) a comprehensive answer is not possible.


Restoring a Time Machine backup created prior to the intrusion or completely erasing the Mac are the only guaranteed solutions.


18 replies
Question marked as Top-ranking reply

Sep 3, 2025 8:39 AM in response to aircrew

Without knowing exactly what the criminal did (which is probably an impossible task) a comprehensive answer is not possible.


Restoring a Time Machine backup created prior to the intrusion or completely erasing the Mac are the only guaranteed solutions.


Sep 3, 2025 9:07 AM in response to aircrew

There’s no point in installing a compromised Canon driver, given full access to a Mac. And no reason not to install Canon- and other-flavored backdoors. The whole configuration is suspect, and best assumed entirely compromised.


There are better and easier and more pernicious paths, as well as sensitive info and passwords to liberate.


Erase, and your backup from prior to whatever modifications were made, and change all of your passwords.


This includes your Apple Account.


If you think your Apple Account has been compromised - Apple Support


If you don’t have a backup created prior to the compromise, you’re either going to lose data, or lose data, or have greater risks, or lose data, and added risk, unfortunately.

Sep 3, 2025 9:45 AM in response to iHelper_SK

iHelper_SK wrote:

Good tip but many hacks are strong so they last after Erasing too…
Ithink it need to totaly delete all files and MacOS too to see this Ak sa Mac spustí s otáznikom - Apple Support (SK) (maybe its slovak sorry…)
And that means the comuper is without an operating system and than download new MacOS

Erasing means deleting everything and reinstalling the operating system. John Galt's advice is excellent.

Sep 3, 2025 12:36 PM in response to iHelper_SK

iHelper_SK wrote:

Good tip but many hacks are strong so they last after Erasing too…


If you are potentially a target for exploits with that value and with that persistence, then you need vastly better advice with your security generally, with this device, with the printer itself, and with the rest of your data management and security practices. Not the sort of security advice that can be offered around here, as the questions can be quite sensitive.


This for normal operations, and for not getting tangled with a tech support scam.


And if you are a potential target for such exploits, then you’ll be replacing most or all of the gear here, Apple, printer, network, and otherwise. In addition to password changes and the rest.

Sep 7, 2025 12:53 PM in response to iHelper_SK

iHelper_SK wrote:

You cant erase the mac?
If so, its very hard problem…


Certainty is a hard problem in information security.


Got sensitive data? Erase it, grind it and melt it down, bury it under concrete, and guard it. Results: Probably secure.


If you are a sufficiently valuable target, you’ll have different threats to consider.


Might those threats include persistence past a reinstall? Sure. That’s more expensive. It might also include easy re-introduction of the problem. (The latter of which is clearly less of an issue here, given how the access was granted here. If the folks had these exploits, they wouldn’t be pretending to be tech support.)


Or there can any number of other exploits encountered, whether electronic or physical or otherwise.


Some other folks of my acquaintance believed themselves targeted by what would be expensive exploits too, though they were encountering other issues unrelated to their electronics.


But for most people, the recommendations by John Galt from earlier in this thread are entirely appropriate, and what I would also suggest.

Scammer takes control of iMac through infected Canon printer driver

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.