Fake Microsoft security updates circulate
Del.icio.us
Digg
Google
Spurl
Blink
Furl
Y! MyWeb
Share:
Sponsors:
Written by Dawn Kawamoto, CNET News.com Published on ZDNet News: April 8, 2005, 7:40 AM PT Forward in EMAIL Format for PRINT Security Security threats Microsoft Corp An e-mail campaign designed to lure people to a bogus Microsoft Web site is making the rounds as part of an attempt to install a Trojan horse, antivirus company Sophos said Friday.
Attackers are sending out fake e-mails.......Attackers are sending out fake e-mails that claim to come from Microsoft's Windows Update. People who click on the link in the message are steered to a site that looks like Microsoft's security update site, where they are urged to download fake patches.
But should unsuspecting users download the bogus patches, they will infect their computers with the Troj/DSNX-05 Trojan horse, according to Sophos. That, in turn, will let the attackers remotely take control of the infected PC.
"Microsoft does not issue security warnings this way," said Graham Cluley, Sophos senior technology consultant. "They don't send updates in an HTML format, so don't follow the links in an e-mail. If you want to see if an update is real, you need to go to the real Microsoft Web site and check there."
People, however, are likely to click on the phony Microsoft update notices, given that they are making the rounds at the same time as Microsoft is poised to issue its regular monthly security update.
"Next week, Microsoft is going to release their monthly security patches. So with all the news that is out there about it, some people may be tempted to click on the (bogus) link," Cluley said.
Microsoft has posted a notice on its site saying that on Tuesday it will issue some critical patches for Windows, Office, MSN Messenger and Exchange.
The software maker is aware of the bogus e-mails, a company representative said Friday. It is encouraging people to go directly to its Web site for updates, instead of clicking on a link that purportedly takes them there. Once on the legitimate Microsoft site, they can click on the link that provides information on how to tell if a Microsoft security notice is legitimate.
Techniques like the Trojan horse e-mails are not new; malicious virus writers have in the past sent e-mails with attachments proclaiming to contain downloadable security updates. The Dumaru worm was one such example, Cluley said.
And in another example of attackers taking advantage of Microsoft's monthly patch cycle, malicious virus writers sent out bogus e-mails in January that claimed to come from Microsoft and that encouraged users to click on an attachment containing a Trojan horse.
The news spam e-mail started making the rounds on April 2 and continued through as late as 6 a.m. Friday PST, according to Sophos. The company noted that only 582 copies have been received, accounting for 0.04 percent of all spam that was tracked during that time by Sophos.
Article submitted by: Telli
Last Update: 04-09-2005
Category: Security
Attackers are sending out fake e-mails.......Attackers are sending out fake e-mails that claim to come from Microsoft's Windows Update. People who click on the link in the message are steered to a site that looks like Microsoft's security update site, where they are urged to download fake patches.
But should unsuspecting users download the bogus patches, they will infect their computers with the Troj/DSNX-05 Trojan horse, according to Sophos. That, in turn, will let the attackers remotely take control of the infected PC.
"Microsoft does not issue security warnings this way," said Graham Cluley, Sophos senior technology consultant. "They don't send updates in an HTML format, so don't follow the links in an e-mail. If you want to see if an update is real, you need to go to the real Microsoft Web site and check there."
People, however, are likely to click on the phony Microsoft update notices, given that they are making the rounds at the same time as Microsoft is poised to issue its regular monthly security update.
"Next week, Microsoft is going to release their monthly security patches. So with all the news that is out there about it, some people may be tempted to click on the (bogus) link," Cluley said.
Microsoft has posted a notice on its site saying that on Tuesday it will issue some critical patches for Windows, Office, MSN Messenger and Exchange.
The software maker is aware of the bogus e-mails, a company representative said Friday. It is encouraging people to go directly to its Web site for updates, instead of clicking on a link that purportedly takes them there. Once on the legitimate Microsoft site, they can click on the link that provides information on how to tell if a Microsoft security notice is legitimate.
Techniques like the Trojan horse e-mails are not new; malicious virus writers have in the past sent e-mails with attachments proclaiming to contain downloadable security updates. The Dumaru worm was one such example, Cluley said.
And in another example of attackers taking advantage of Microsoft's monthly patch cycle, malicious virus writers sent out bogus e-mails in January that claimed to come from Microsoft and that encouraged users to click on an attachment containing a Trojan horse.
The news spam e-mail started making the rounds on April 2 and continued through as late as 6 a.m. Friday PST, according to Sophos. The company noted that only 582 copies have been received, accounting for 0.04 percent of all spam that was tracked during that time by Sophos.
Article submitted by: Telli
Last Update: 04-09-2005
Category: Security
Current rating: 5.13 by 43 users
Would you recommend this article to a friend? |
Not a Chance | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Absolutely |
Related News Stories
(9,429 reads) 07-05-2008
· Fusion Security(15,118 reads) 06-02-2007
· NukeSentinel(tm)2.5.10 Critical Update(13,880 reads) 05-07-2007
· NukeSentinel(tm) 2.5.08 Maintainance Release(15,348 reads) 03-15-2007
· NukeSentinel(tm) 2.5.07 Reissued: Critical Update(13,852 reads) 03-02-2007
· NukeSentinel(tm) 2.5.06: Critical Update(14,602 reads) 01-23-2007
· NukeSentinel(tm) 2.5.05 released(14,630 reads) 12-24-2006
· NukeSentinel 2.5.04 released(14,358 reads) 11-03-2006
· NukeSentinel(tm) 2.5.03 Released(18,199 reads) 10-19-2006
· Php Nuke 8.0 Patched(14,586 reads) 10-01-2006
· ipBan Modification
Please register or sign-in to post comments.