: Go to System Settings > General > Login Items and remove unknown applications. Identify the "Spam Source" :
: Restart your Mac and immediately press and hold the Shift key until the login window appears.
Here is a comprehensive guide to identifying, removing, and protecting yourself from Trojan-based spam. Phase 1: Immediate Containment Trojan Horse Virus Spam Remover
: Never download "cracked" software, free versions of paid games, or attachments from unknown emails. These are the #1 delivery methods for Trojans.
Get started with secure apps that detect and remove malware in seconds Why you're seeing this ad unit : Go to System Settings > General >
: A great "second opinion" scanner that uses cloud-based technology to find files that other engines might miss. Phase 4: System Restoration
Before you start the removal process, you need to stop the Trojan from communicating with its "command and control" server. Phase 1: Immediate Containment : Never download "cracked"
: Specifically designed to remove "PUPs" (Potentially Unwanted Programs) and adware that often ride along with Trojans to cause spam pop-ups.