Apple Email Virus

Also Known As: Hancitor virus
Type: Other
Distribution: Low
Damage level: Severe

"Apple Email Virus" removal guide

What is "Apple Email Virus"?

Scammers (cyber criminals) use the "Apple Email Virus" spam email campaign to distribute the Hancitor virus. The main goal of this email is to trick recipients to download and open an attachment. This is a typical scam used to infect computers and should be ignored. Opening the attachment might cause computer infections and other problems.

Apple Email Virus

Cyber criminals behind the "Apple Email Virus" scam make it appear as if an email has been received from Apple. According to the message, the recipient's Apple ID was used to make a purchase from the Apple Store using a device that had not been previously associated with the ID. They also claim that it is very likely that this email was sent following a change made to the recipient's password after the aforementioned purchase. The main purpose of this email is to make people believe that a purchase was made using their Apple ID. Scammers even offer to change the users' Apple ID password if they did not make the purchase. They hope that the Microsoft Word (.doc) attachment will be downloaded and opened. Opening this document downloads and installs the Hancitor malicious program (trojan). This infection opens "backdoors" for other viruses to infiltrate. These infections might cause various problems such as privacy issues, stolen personal details (logins, passwords), financial loss, and so on. Therefore, we strongly recommend that you ignore the "Apple Email Virus" scam and do not open the attached document.

There are many spam campaigns/scams of this type used to spread viruses such as Adwind, FormBook, TrickBot, LokiBot, and so on. Most infections proliferated using scam campaigns (including "Apple Email Virus") might lead to serious problems. Whatever the purpose and origin of a particular virus, it must be removed immediately.

How did "Apple Email Virus" infect my computer?

"Apple Email Virus" infects computers when users download and open the presented attachment (a Microsoft Word document) and give permission to enable macros commands. Once enabled, this particular malicious attachment installs the Hancitor trojan. In other cases, scammers trick users into extracting archive files (that contain executables) or executing .exe files. Infected files might also be documents in other format such as PDF.

How to avoid installation of malware?

Think twice before downloading and opening attachments (files) that are delivered in emails received from unknown, suspicious email addresses. If the email is irrelevant, simply ignore it or delete it. If you do not have an Apple ID (you do not use Apple services), this email definitely does not concern you at all. Have a reputable anti-spyware or anti-virus suite installed, updated, and enabled. Computers without this software installed are vulnerable to infections/high-risk viruses and other threats. If you have already opened "Apple Email Virus" attachment, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.

Text presented in the "Apple Email Virus" email message:

Subject: Apple Notification Regarding Your Recent Order

Recent Order

Your Apple ID was used to purchase from Apple Store on a device that hadn't previously been associated with that Apple ID. You may be receiving this message if you reset your security password since your last purchase.
If you made this purchase, you can ignore this e mail. It was only sent notify to you in case you didn't make the purchase yourself.
View Bill

In case you did not make this purchase, we recommend that you go to to change your password, then see Apple ID: Security and your Apple ID for additional guidance

Best regards,
Apple

Malicious attachment distributed via "Apple Email Virus" spam campaign:

apple email virus attachment presented in apple email virus scam campaign

Screenshot of a malicious Hancitor process ("ImageMagick Studio library and...") in Task Manager:

apple email virus hancitor process task manager

Update 10 December, 2018 - Cyber criminals released an updated version of "Apple Email Virus" spam campaign, which targets Mac users. Rather than proliferating the Hancitor trojan, this variant attempts to trick users into entering account credentials. This is done to steal account information.

Screenshot of the email (mobile version):

Apple Email Virus stealing accounts

Text presented within this email:

Apple Information Service

Dear client,

We emailed you a little while ago to ask for your help resolving an issue with your account.

What the problem?

We detect unauthorized login attempts to your account from other location. Some information on your account appears to be missing or incorrect. Please update your information promptly so that you can continue to enjoy all the benefits of your Apple ID account.

What you can do next?

Please log in to your account to see the steps you'll need to complete your informations. We will review your account within 24 hours, If you do not complete you can't get full access to your account.

Please verify your account information by clicking on the link below :

As always, if you need help or have any questions, give us a call or go to our Help Center. You can find the link on any page of our website.

Regards,

Apple Support

Apple ID | Support | Privacy Policy
Copyright ©2018 Apple Inc.
All Rights Reserved

Instant automatic removal of Hancitor virus: Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of Hancitor virus. Download it by clicking the button below:
▼ DOWNLOAD Spyhunter By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. Free scanner checks if your computer is infected. To remove malware, you have to purchase the full version of Spyhunter.

Quick menu:

How to remove malware manually?

Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:

malicious process running on user's computer sample

If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:

manual malware removal step 1 Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:

screenshot of autoruns application

manual malware removal step 2Restart your computer into Safe Mode:

Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.

Safe Mode with Networking

Video showing how to start Windows 7 in "Safe Mode with Networking":

Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.

Windows 8 Safe Mode with networking

Video showing how to start Windows 8 in "Safe Mode with Networking":

Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.

windows 10 safe mode with networking

Video showing how to start Windows 10 in "Safe Mode with Networking":

 

manual malware removal step 3Extract the downloaded archive and run the Autoruns.exe file.

extract autoruns.zip and run autoruns.exe

manual malware removal step 4In the Autoruns application click "Options" at the top and uncheck the "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.

Click 'Options' at the top and uncheck 'Hide Empty Locations' and 'Hide Windows Entries' options

manual malware removal step 5Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.

You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".

locate the malware file you want to remove

After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.

searching for malware file on your computer

Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.

To be sure your computer is free of malware infections, we recommend scanning it with Spyhunter for Windows.