You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Email.Phishing.Blackhole in Microsoft Office Data Records

I recently used ClamXav to scan my MacBook Pro and found Email.Phishing.Blackhole in the path Documents/Microsoft User Data/Office 2011/Data Records. Does this affect my Microsoft Office documents in any way ? Can I delete this ?

Mac Pro, OS X Mountain Lion (10.8.5)

Posted on Nov 5, 2013 10:42 AM

Reply
16 replies

Nov 5, 2013 12:04 PM in response to inc2022

inc2022 wrote:


I recently used ClamXav to scan my MacBook Pro and found Email.Phishing.Blackhole in the path Documents/Microsoft User Data/Office 2011/Data Records. Does this affect my Microsoft Office documents in any way ? Can I delete this ?

NO! That will likely delete all your e-mail and perhaps other MS Office date.


For fastest, most efficient answers to questions such as this, please visit the ClamXav Forum. There are specific instructions in "Instructions for identifying infected emails" which will allow you to identify the wording of the message and then you will need to use MS Outlook to find and delete the message in question, but I'll save you some time. You cannot be infectected by simply reading this e-mail, just don't click on any hyperlinks or open an attachment.


The message contains the following sets of words or images:

STAR ALLIANCE LOGO


From: "US Airways - Reservations" <reservations@myusairways.com>


Be advised that there are variants of this infections named "Email.Phishing.Blackhole-2 through -5" so if there is a number at the end then the contents will be much different.

Nov 5, 2013 1:02 PM in response to MadMacs0

Thanks for the info ! I identified the wording of the message following the instructions on the forum you referred me to. Unfortunately, I was not able to find any such mail in my Outlook. I must point out that while some of the infected files identified during my scan had a filename ending with .emlx and have path in the Library/Mail/ imap, this one - Email. Phishing. Blackhole has a file name x27_75641.olk1MsgSource and the path is in Users/Documents/Microsoft User Data/ Office 2011 Identities/Main Identity/Data Records. I am just wondering if this is integrated into my Microsoft Office and if there is any chance I can get rid of it.

Nov 5, 2013 1:41 PM in response to inc2022

inc2022 wrote:


Thanks for the info ! I identified the wording of the message following the instructions on the forum you referred me to. Unfortunately, I was not able to find any such mail in my Outlook. I must point out that while some of the infected files identified during my scan had a filename ending with .emlx and have path in the Library/Mail/ imap

Never use the Finder, ClamXav or any other A-V software to move these files to the Trash or Quarantine as this will corrupt the mailbox index. Choose "Reveal in Finder," double-click to open and note the date/time and Subject. Close that window and find the same e-mail in Apple Mail to use the delete button to remove it and empty the e-mail Trash if you have elected to move it their.

Email. Phishing. Blackhole has a file name x27_75641.olk1MsgSource and the path is in Users/Documents/Microsoft User Data/ Office 2011 Identities/Main Identity/Data Records. I am just wondering if this is integrated into my Microsoft Office and if there is any chance I can get rid of it.

Sorry, although I use Office 2011 I don't have Outlook, so the only thing I can tell you is that with my setup that directory contains several sub-directories:

Categories

Contacts

Database Headers

Folders

Mail Accounts

Preferences

Recent Addresses

Saved Searches

Schedules

Signatures


I am not sure where you are reading the path from, but I suspect you aren't seeing the full path. If you click on the entry and select "Show Path" or "Reveal in Finder" that might take you to a single file that can be somehow dealt with. If you have closed the window, that same information can be searched for by clicking Open Scan Log. Again, I don't recommend you drag that file to the trash at this time as I don't know how Office deals with missing files.

Nov 5, 2013 1:57 PM in response to MadMacs0

Thanks for the tip with deleting stuff from Apple mail.


I have been using Show Path/ reveal in finder to identify where the file is. That's why I know this particular file is in the Documents/ Microsoft User Data. I don't think it has anything to do with Mail or Outlook. So if you know whether I can delete it or not that would be great .

Nov 5, 2013 7:28 PM in response to inc2022

inc2022 wrote:


I don't think it has anything to do with Mail or Outlook.

Again, I'm just guessing but since the infection name identifies it as "E-mail" and with a file extension of .olk1MsgSource it certainly sounds to me like it has something to do with Outlook "olk" and e-mail "MsgSource" but I can't seem to find anything like that documented on the Internet.


If the file isn't very big, then perhaps we can learn something by extracting any text it contains.


Open the Terminal app (found in /Applications/Utilities/). Triple click the following and type Command-C to copy it to the clip board then paste it into the terminal window after the "$ " prompt using Command-V.

strings ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/x27_75641.olk1MsgSource

If it tells you the file doesn't exist, then I don't have the exact information about the path and you'll need to try it in a different manner.


Copy and paste the results back here. Note that their may be user data in the results (e.g. your e-mail address) which you should delete from the entry.

if you know whether I can delete it or not that would be great .

I will not be telling you that as I never tell a user to do anything that I haven't tested for myself. Since I don't user Outlook, don't have any files with names like that and can't find anything about them, you'll have to hear that from somebody else or make up your own mind after we've discovered all we can about it.


I will tell you that this file is harmless to you unless you use it to send privacy data to someone. My guess is that it's an attachment to a message that may or may not still exist in an Outlook mailbox and could well be Windows only.

Nov 10, 2013 3:54 PM in response to MadMacs0

Hi


I tried the strings~/ ...you suggested and it says 'No such file or directory' . I alo tried revealing in finder and opening it but it prompts me to choose an application to view the contents of the file. So I haven't done anything about that.I updated Outlook yesterday, emptied the cache, emptied the trash in Outlook, emptied the Deleted messages folder. And it still shows up after the ClamXav scan. Is there anything else I can do to get rid of it ?

Nov 10, 2013 4:40 PM in response to inc2022

inc2022 wrote:


Hi


I tried the strings~/ ...you suggested and it says 'No such file or directory' .

Then you haven't given me enough information on the path. Either:


- In ClamXav open the Scan Log by clicking the icon on the tool bar

- When the "clamXav-scan.log" window opens, you will only be looking at the only the most recent results

- Select Find->Find from the Edit menu or type Command-F

- Type "FOUND" in all caps and without the quotes in the Find box

- Uncheck the "Ignore case" box and hit enter

- Click the "Next" button or type Command-G until you find what you are looking for

- If it doesn't show up in the most recent results, use the "▲ Earlier|" button in the lower right corner of the window to move back through the log.

- Then copy and paste the entry for that file back here.


or


The next time you scan follow these instructions so that I know the exact path to the file and can reconfigure the strings command for you:


To get detailed infomation on what ClamXav has found, click in the top pane of the ClamXav window showing the Infection / File Name / Status to make sure it's in front and type Command-A, Command-C (or choose "Select-All", "Copy" from the "Edit" menu) to copy the information to your clipboard, then come back here and type Command-V or choose "Paste" to show us what was found where.


You can substitute "~" for "/Users/<yourusername>" if you are sensitive to revealing that.

Nov 13, 2013 12:40 PM in response to MadMacs0

I have copied and pasted the entire path as you said :


/Users/<username>/Documents/Microsoft User Data/Office 2011 Identities/Main Identity/Data Records/Message Sources/0T/0B/0M/59K/x27_59278.olk14MsgSource: Email.Phishing.Blackhole FOUND


/Users/<username>/Documents/Microsoft User Data/Office 2011 Identities/Main Identity/Data Records/Message Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource: Email.Phishing.Blackhole FOUND


I am not sure if this could be related or not but I am just letting you know, I sent an email last week with an attached Microsoft Word document and the receiver told me it was infected with something called bloodhound. ANd I was not alerted of anything of that sort with ClamXav or Symantec, I don't know if these events are related or not but since you are helping me with this whole thing, I just wanted to throw it out there in case it will help you figure out what might be going on.


I really appreciate your help. Thanks a lot !

Nov 14, 2013 7:31 PM in response to inc2022

It's been so long, I forgot what we were doing. Looks like we were trying to find out if what text that e-mail contains using Terminal.


So again Open the Terminal app (found in /Applications/Utilities/). Triple click the following and type Command-C to copy it to the clip board then paste it into the terminal window after the "$ " prompt using Command-V.

strings ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main Identity/Data\ Records/Message\ Sources/0T/0B/0M/59K/x27_59278.olk14MsgSource

Copy and paste the results back here. Note that there may be user data in the results (e.g. your e-mail address) which you should delete from the entry.


Now for the second one:

strings ~/Documents/Microsoft User Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource

As far as

I sent an email last week with an attached Microsoft Word document and the receiver told me it was infected with something called bloodhound.

Without the full name of the infection and what A-V software found it, I can't do much. There have been over 200,000 files uploaded to VirusTotal.com where some sort of "bloodhound" infection was detected by one or more A-V scanners. By comparison I could only find three with "Email.Phishing.Blackhole" and only ClamXav detected the, which makes me a bit suspicious. So I don't think there's any connection, but can't be certain.


The definition for your infection was added to the ClamAV® database back in April, 2012, so it's not anything new. I did find one other user in the ClamXav Forum that reported finding it here.


I think that's enough until we see what's contained in those files.

Nov 14, 2013 7:58 PM in response to MadMacs0

Ok so I copied and pasted the first thing : strings ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main Identity/Data\ Records/Message\ Sources/0T/0B/0M/59K/x27_59278.olk14MsgSource


This is what I got :


LPER<xxxx>:~ <username>$ strings ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main Identity/Data\ Records/Message\ Sources/0T/0B/0M/59K/x27_59278.olk14MsgSource

strings: can't open file: /Users/<username>/Documents/Microsoft User Data/Office 2011 Identities/Main (No such file or directory)

strings: can't open file: Identity/Data Records/Message Sources/0T/0B/0M/59K/x27_59278.olk14MsgSource (No such file or directory)



And with the second one : strings ~/Documents/Microsoft User Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource,


I got :


LPER<xxxx>:~ <username>$ strings ~/Documents/Microsoft User Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource

strings: can't open file: /Users/<username>/Documents/Microsoft (No such file or directory)

strings: can't open file: User (No such file or directory)

strings: can't open file: Data/Office 2011 Identities/Main Identity/Data Records/Message Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource (No such file or directory)


I don't know any other information about the bloodhound, or what anti-virus was used to detect it. I will try to get that information from the person who received my email.

Nov 14, 2013 8:33 PM in response to inc2022

Sorry. Now that I've had a chance to configure a mockup on my computer and test them I see what I left out.


I notice that the actual file name has changed over time. Not certain why that would be, but I hope we don't have a moving train here.


So the revised commands are:

strings ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/59K/x27_59278.olk14MsgSource

and

strings ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource

Nov 14, 2013 8:44 PM in response to MadMacs0

For this one - LPERxxx:~ <username>$ strings ~/Documents/Microsoft User Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource

I got :

strings: can't open file: /Users/<username>/Documents/Microsoft (No such file or directory)

strings: can't open file: User (No such file or directory)

strings: can't open file: Data/Office 2011 Identities/Main Identity/Data Records/Message Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource (No such file or directory)


And for LPERxxxx:~ <username>$ strings ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/59K/x27_59278.olk14MsgSource


I got:


strings: can't open file: /Users/<username>/Documents/Microsoft User Data/Office 2011 Identities/Main Identity/Data Records/Message Sources/0T/0B/0M/77K/x27_77299.olk14MsgSource (No such file or directory)


So if its travelling, then do I have to run the scan again and look for the contents of the file following the same procedure after changing the path to whatever it turns out to be ?


Nov 14, 2013 9:18 PM in response to inc2022

inc2022 wrote:


So if its travelling, then do I have to run the scan again and look for the contents of the file following the same procedure after changing the path to whatever it turns out to be ?

Looks that way.


Let's try this just to make sure that I've got the first part right:

ls -lR ~/Documents/Microsoft\ User\ Data/Office\ 2011\ Identities/Main\ Identity/Data\ Records/Message\ Sources/0T/0B/0M/

then go ahead and run the scan on ~/Documents/Microsoft User Data/Office 2011 Identities/Main Identity/Data Records/Message Sources/

Nov 15, 2013 9:11 AM in response to inc2022

After giving it some thought over-night, I think this would all be much easier if I talk you through something a little more complex, but should save a lot of time in the process.


  • After completing the scan, do a right-click / control-click on an entry and select "Reveal In Finder".
  • When the window opens, arrange things so that you can see both the file and an open Terminal window.
  • In the terminal window type "strings " without the quotes and note the single space after the word.
  • Now click on the infected file in the Finder window and drag it to the Terminal window, releasing it there to copy the path to the file.
  • Now click on the Terminal window and hit return.


Do the same with the second file.

Nov 15, 2013 11:00 AM in response to MadMacs0

Ok, this time with the scan I got only one file with Email.Phishing.Blackhole and I followed you instructions and this is what I got after hitting enter in Terminal:


MSrc

UHDelivered-To: <myemailID>

Received: by 10.67.14.65 with SMTP id fe1csp46728pad; Fri, 23 Aug 2013

13:03:42 -0700 (PDT)

X-Received: by 10.68.125.226 with SMTP id mt2mr1460481pbb.115.1377288222051;

Fri, 23 Aug 2013 13:03:42 -0700 (PDT)

Return-Path: <bounces.usair@myusairways.com>

Received: from myusairways.com (usad.myusairways.com. [67.131.29.33]) by

mx.google.com with ESMTP id ds3si764935pbb.109.1969.12.31.16.00.00; Fri, 23

Aug 2013 13:03:42 -0700 (PDT)

Received-SPF: pass (google.com: domain of bounces.usair@myusairways.com

designates 67.131.29.33 as permitted sender) client-ip=67.131.29.33;

Authentication-Results: mx.google.com; spf=pass (google.com: domain of

bounces.usair@myusairways.com designates 67.131.29.33 as permitted sender)

smtp.mail=bounces.usair@myusairways.com; dkim=policy (weak key)

header.i=@myusairways.com

DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=myusairways.com;

s=mua; t=1377201592; bh=8D3/6DJyNYzVWsRd9dHgERYPQKFTgp8dOv3eY0C9FPI=;

h=DomainKey-Signature:Date:Message-Id:From:Reply-To:To:Subject:

MIME-Version:X-Mailer:List-Unsubscribe:Content-Type:

Content-Transfer-Encoding;

b=ez22EH5wYOYdFHLY9ifWgiPJ7/J5TS/sHndTOHj6UeqHfuq+FtxVbNHtMI3iD1glY

FRSeS8ZsuP2iry7bC2VTjC5Csi2QypGa6kvY3inUkaoKdAEap+kTauyUEYFIG7b

DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=mua; d=myusairways.com;

h=Date:Message-Id:From:Reply-To:To:Subject:MIME-Version:X-Mailer:List-Unsubscri be:Content-Type:Content-Transfer-Encoding;

b=RUDq8u25RMX8edUL8OifobMPxZmWpOT/ISHNK/FNnQsffboXxT8+i+64PirJnnUrCQXHNZO7TjTAS /wj2lEJPR4JBhoCiURF+/mNwLxSQ03uSaCdBCZuO4P2HEpJqfc9;

Date: Fri, 23 Aug 2013 12:59:52 -0700

Message-Id: <1377287992.eb40.USAZ.2228715.1244263377MSOSI1.33OSIMS@myusairways.com>

From: "US Airways - Reservations" <reservations@myusairways.com>

Reply-To: "US Airways - Reservations" <reservations@myusairways.com>

To: <myemailID>

Subject: US Airways check-in reminder

MIME-Version: 1.0

X-Mailer: ZetaMail50

List-Unsubscribe: <mailto:listunsub+LU+USAZ+2228715+1244263377+<myemail>=gmail.com@myusairways.com>

Content-Type: text/html; charset="UTF-8"

Content-Transfer-Encoding: quoted-printable

Email.Phishing.Blackhole in Microsoft Office Data Records

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.