Possible Email Virus/Hack?

I am running three gmail accounts on my Apple Mail and recently, when I reply to certain folks the email shows as being sent to me, comes to my inbox, but does not show as being sent to the intended recipient (even though they are receiving the emails). There is no BCC function turned on anywhere and I see no address in the BCC bar when I press Send. Also, every time I send an email or check for new mail, the Mail Activity bar on the bottom left always shows 2 incoming messages that never materialize (not even in Junk or Spam folders). Any ideas what could be going on? Thx

I cannot comment on the reply issue you mention without more information. Without some specific details, it's impossible to say whether this is normal or not. It could be an issue between GMail and Mail on Mavericks, if you're running Mavericks. If so, you may want to try updating to 10.9.2, if you haven't already, as that improves many aspects of Mail.
Regarding the inaccurate incoming mail count, one possibility is that you have Mavericks and haven't updated to 10.9.2 yet. There is a known issue with that count in Mail on 10.9 and 10.9.1.
Whatever the case, nothing you describe sounds at all like either malware or a hack.

Similar Messages

  • Possible email virus ???

    My wife received an email from a friend titled "this is a painting not a picture"
    There was no text in the email and she opened the attachment.
    A few minutes later she said her mouse was gone from the screen and could do nothing. Even trying to power off using the button behind the screen had no effect..The only thing I could do was to disconnect the power cord from the wall.
    We then seemed to be able to operate normally, but since then {about a week ago} the same thing happened, no mouse and unplugging from the wall was the only fix.
    Also last night she attempted to send an email and it would not send so she quit the computer by putting it to sleep I think.
    This morning I attempted to wake up the computer and it would not respond, so unplugging was the only fix .
    When I got into her email there was no email in here "sent" folder but in her "in box" she had many many copies sent to herself that said they were "from" auto.response..
    Then she received a message from the person whom she had tried to send the email to indicating that they had received her email and 20+ copies of it.
    I updated all the latest apple software this morning and installed "mac scan" trojan remover plus I Installed "iAntiVirus" and found nothing with either scanner
    I wonder if any one else had a similar problem.
    Also I asked my wife what the "PICTURE" looked like when she opened it.She said it had a black background and some sort of necklace and maybe flowers....
    It sure sounds to me like she opened a nasty virus.
    Snowed one...

    Welcome to Apple Discussions!
    This is what is known as a trojan horse, not a virus. Viruses are self-replicating without any user interaction. The fact she had to open the e-mail to make it do what it did, says it was strictly an e-mail virus. It is possible that what happened, is that by clicking on some link within the e-mail, it ended up confirming her e-mail address, and then the e-mail program, which already might have been set to instantly replicate the contents of the inbox got overwhelmed with the spam that was sent.
    Do not, under any circumstance open e-mail from an unknown source.
    She should also make sure her friends do not do the same. Because it is also possible, that your wife was not the originator of this virus, but rather her friend, and more likely. Your wife's e-mail address in the friend's digital addressbook might have been compromised and sent to a spammer, and then self replicated on the friend's machine to send to your wife.
    Do not allow e-mail to replicate its contents automatically more than once every 5 minutes. Tell your friends to use BCC when mass e-mailing, as well as your wife, and not CC, to avoid showing the addressbook to everyone in the list. Otherwise other spam viruses might be spread.

  • Help removing possible email virus

    I am getting tons of bounce backs from emails that i did not send and addresses are not from my address book. Virus scans of hard drive with multiple security software products  come up negative. any ideas of where to go from here?

    Spoofing,
    Unfortunately the standards that defines the basic  eMail SMTP protocol do not do a validation of who you say you are so by using the protocol I can connect to a mail server and say, e.g.. From [email protected] , and it a basic mail server will accept it.  Incorrectly identifying yourself in any of the TCP/IP protocols  is a spoofing attack.

  • Email message rejected for possible spam/virus content

    When I do a Reply All on an email that includes my own Mail email address in the recipient list, the reply is delivered to everyone but me.  I get a [email protected] email with a Diagnostic code: "smtp;553 5.3.0 17.158.232.236 Your message was rejected for possible spam/virus content.Please ask your email provider to visithttp://emailadmin.registeredsite.com for resolution." 
    This never happened before.  The only thing that has changed on my system is that I have recently installed Webroot SecureAnywhere antivirus.  Any ideas?

    I suggest you contact godaddy for some support using their mail service.

  • I just got an email from Apple, asking me to complete a survey.  If I don't then I'll loose my Apple ID.  I think this is spam/virus/hacker.  Anybody have any info on this?

    i just got an email from Apple, asking me to complete a survey.  If I don't then I'll loose my Apple ID.  I think this is spam/virus/hacker.  Anybody have any info on this?

    There have been a number of phishing scam emails going around for at least half a year...do not respond, click links, or do anything with that email.  Apple does not operate that way.
    See: http://www.apple.com/legal/more-resources/phishing/

  • Has my bt email been hacked? GREETINGS and virus l...

    has BT emails been hacked?? have had emails sent to me with the title GREETINGS from me and also being sent to people in my sent box??? other people on BT have had the same. help please

    This is a customer to customer forum only, where forum members, who are only BT customers, can help each other with BT Retail products and services.
    Anything you post here does not go to BT. Although the forum is moderated by BT, not all posts are read.
    I have a general guide which may help.
    How to check if your BT Yahoo e-mail address has been hacked
    If you have recently responded to a fake e-mail giving you a link to login to your account, then your login information has been stolem.
    There are some useful help pages here, for BT Broadband customers only, on my personal website.
    BT Broadband customers - help with broadband, WiFi, networking, e-mail and phones.

  • BT email accounts hacked

    Hi
    I run a computer support business and over the last few days over 60 of my customers have had their email accounts hacked and spam email sent out to everyone in their address books
    I have virus scanned most of the computers and all are clean - so it appears the webmail password was hacked and someone gained access
    This happens quite regularly now with BT - but I don't see it hardly ever with other email providers and I have a lot of customers
    What is BT doing about this -as I have a lot of angry customers who are ready to leave BT and go elsewhere if you cannot improve your security!
    I know in some cases it is not always your fault and down to customers choosing stupid passwords, but not helped when your helpdesk resets passwords to things like welcome1 or london12 and the customer then never resets them (when threy should be forced on first login to change them)

    wingers wrote:
    Hi
    I run a computer support business and over the last few days over 60 of my customers have had their email accounts hacked and spam email sent out to everyone in their address books
    I have virus scanned most of the computers and all are clean - so it appears the webmail password was hacked and someone gained access
    This happens quite regularly now with BT - but I don't see it hardly ever with other email providers and I have a lot of customers
    What is BT doing about this -as I have a lot of angry customers who are ready to leave BT and go elsewhere if you cannot improve your security!
    I know in some cases it is not always your fault and down to customers choosing stupid passwords, but not helped when your helpdesk resets passwords to things like welcome1 or london12 and the customer then never resets them (when threy should be forced on first login to change them)
    Hi.
    Have you asked these "customers" if they have received anything recently, or clicked on anything not expected ? Do they all use the same things like facebook or other social sites ? Are they connected in anyway, or have they just come to you for help ?
    If I may be frank, why did they come to you initially rather than contacting the free BTinternet helpdesk ?
    Webmail password change is the same for all ISPs, not Yahoo! specific. If the helpdesk gives the user a new password, then really it should be down to the user to make sure they alter it themselves. Clearly people don't do this, but even if the helpdesk said to do it - some people will still not do this.
    You say you don't see it hardly with other email providers, that implies that it does happen. What other mail providers for example ? BTYahoo! is one of the largest in the UK, so it's not unlikely that more would be seen than for some other ISPs.
    http://www.andyweb.co.uk/shortcuts
    http://www.andyweb.co.uk/pictures

  • Yahoo email viruses in mac

    How I can stop yahoo email viruses when I am using Mac is there antivirus necessery to instal for mac

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Mt. Lion Version OS X 10.8 - Email Virus

    I'm writing for my nephew who recently recieved an email virus which is causing havoc. I'm not sure if its a worm type virus? Other emails have been sent out without his knowledge. 
    His Laptop Details:
    Mac Book Pro Model 15" Early 2001 - 2GHz - Intell Core i7
    Version Mt. Lion Version OS X 10.8  (12A269)
    Safari Version 6.0
    The Mail client within Mt. Lion Version OS X 10.8 has been compromised. Sometimes he's unable to use alternative online email client to check mail status.
    This is the first I've heard of a Mac virus.
    Can anyone offer any help?
    Thanx
    Mike

    This is the first I've heard of a Mac virus.
    You still haven't 
    This is often assumed to be a virus when someone sees it.  The issue isn't that his Mac has been compromised, but rather his email account has either been hacked or it is being spoofed.  The emails are being sent "as" him, but not from his Mac.  If someone hacked his email, meaning someone got access to his email password, they could easily then send email as him from any computer.  Changing his email password can fix this.  If someone is spoofing his email address, there's unfortunately not much that can be done.  That basically means someone is pretending to be him and making it look as if the emails are originating from him when, in fact, they are not.
    Sometimes he's unable to use alternative online email client to check mail status.
    That would seem to confirm that it is not his machine that is the source of the problem.  It sounds like his web-based email is the culprit.

  • Anyone know malware removal tool for Mac OS X 10.5.8?  My email was hacked.

    My yahoo email was hacked and emails sent to everyone in my address book with creepy check important confidential Google document message.  It happened to me a few weeks prior.  I am looking for malware identification and removal tool for my G5 Tower / MAC OS X 10.5.8; but Apple's web site focuses only on current products.   Anyone have suggestions? 

    Hello,
    ClamXAV, free Virus scanner...
    http://www.clamxav.com/
    Free Sophos...
    http://www.sophos.com/en-us/products/free-tools/sophos-antivirus-for-mac-home-ed ition/features.aspx
    Little Snitch, stops/alerts outgoing stuff...
    http://www.obdev.at/products/littlesnitch/index.html
    http://www.reedcorner.net/mmg-catalog/

  • I had my email acount hacked so i had to set up new email and i can't get my photos off i cloud now?

    i had my email account hacked the other day and they changed the password so i could'nt get into it, so i set up a new email and password and changed password and i now can't get my photos on my ipad because it was backed up on i clould with my old email. how can i get them back?

    You could try contacting iTunes store support.  If you can proove your identity to their satisfaction, such as by answering your security questions correctly, they may be able to do something for you so you can regain control of the account.  Although this is an iCloud issue, I'm suggesting iTunes store support because they deal with Apple ID issues all the time.  You can reach them here: http://www.apple.com/emea/support/itunes/contact.html.

  • My old email was hacked. My old Apple ID had the password changed and now with my new Apple ID I want to delete my old account and transfer my purchases and details to my new account. How do I go about this when I cannot access my old email as it has been

    My old email was hacked and my password corrupted. Now I have a new Apple ID but cannot cancel the old ID as I no longer have access to that email address.  How do I cancel the old ID and merge my purchases and details with the new Apple ID?

    You can't merge Apple IDs.  You also can't cancel (delete) and existing ID, you can only choose to stop using it.
    If your old ID was compromised and you can no longer access it, you'll have to contact Apple for assistance.  Go to https://expresslane.apple.com ; click 'See all products and services' at the bottom of the page. In the next page click 'More Products and Services, then 'Apple ID'. In the next page select 'Other Apple ID Topics' then then 'Apple ID account Security’.

  • How do I delete my iCloud off my phone when my email was hacked and I can't figure out the password?

    My email was hacked recently and I have been trying to reset it for awhile. Theres no way to delete the account or reset my phone without the password. I also dont remeber what year I put in for my birthday.

    Call Apple and ask for Account Security.

  • My old email was hacked and no longer in use. My old Apple ID is no longer recognized  so I opened a new one. But all my apple gadgets are still prompting my void email which , of course, does not recognize my my former Apple ID. ID

    Even if my iPad and all apple gadgets contain my new email, the old email I no longer use is the one prompted for my apple ID when I visit the App Store. Please help.
    Catibayan

    Making a new ID is not a good solution, as all your previous purchases are forever tied to the old one.
    Who cares if your old email was hacked, it's the apple id that matters. If you stil can't acccess it, then try this:
     Account Security Team (AST) 
    Check the AppleCare number for your country here:
    http://support.apple.com/kb/HE57
    Call them up, and let them know you would like to be transferred to the Account Security Team.

  • Help!!! I think my email was hacked and now I can't get into it at all. All of the suggestions didn't help so far. I have double clicked, rebooted, and deleted the account. Is there a way that I can have a reset password to an alternate email?

    Help, my email was hacked, now I can't get in at all. Can I reset the password through an alternate email?

    You do realize that there are many, many email providers and without knowing which one you are talking about, there is no way to answer your question?
    Which then leads to this ..... Have you contacted your email provider about this? That's probably the best place to start. See what they recommend.

Maybe you are looking for

  • Process  create Purchase order for external instructor in training & event

    Dear Experts Need the process  create Purchase order for external instructor in training & event management. Regards Sonali

  • Will I lose my itunes music if I restore a blank, new ipod?

    I have a newly refurbished 8GB ipod nano. It is formatted for a Mac. It has no music on it yet. If I choose to "restore" it for windows, will I lose all my itunes music, or just, theoretically what is on my nano?

  • No sound in safari

    suddenly I have no sound in any video playing in safari - any ideas? can't find any sound preferences for safari "media" play iMac 17 G5 2GH 1G 250GB   Mac OS X (10.4.1)  

  • 2 separate itunes accounts for 1 ipod touch

    This is probably not complicated but here is my situation.... My daughter has an ipod touch and always asks me to add movies, games, etc. My ex wife decided that she wanted the itunes account shared with her account and since she won't give me the pa

  • Photo numbering bug?

    In the library module right hand column, which shows my folder system, folders no longer show the number of images in each until you get to the particular month into which you are downloading at the present time.  I have 26,000 photos in my catalog l