Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Fake Microsoft patch e-mail warning.

Sophos : 27 June, 2007  (Technical Article)
Trojan horse embedded in fake e-mail claiming to be a security patch from Microsoft.
IT security and control firm Sophos is warning users of a widespread attempt to infect email recipients by sending a warning about a bogus Microsoft security patch.

The emails, which have the subject line 'Microsoft Security Bulletin MS07-0065' pretend to come from Microsoft, and claim that a zero-day vulnerability has been discovered in the Microsoft Outlook email program. They go on to warn recipients that 'more than 100,000 machines' have been exploited via the vulnerability, in order to promote medications such as Viagra and Cialis.

The phoney email encourages users to download a patch, claiming that it will fix the problem and prevent them from being attacked by hackers. However, clicking on the link contained inside the email does not take computer users to Microsoft's website, but instead to one of many compromised websites hosting a Trojan horse.

'Security bulletins from Microsoft describing vulnerabilities in their software are a common occurrence, and so it comes as no surprise to see hackers adopting this kind of disguise in their attempt to infect Windows PCs,' said Graham Cluley, senior technology consultant for Sophos. 'The irony is that as awareness of computer security issues and the need for patching against vulnerabilities have risen, so social engineering tricks which pose as critical software fixes are likely to succeed in conning the public.'

In examples seen by Sophos experts, the emails have correctly displayed the recipient's full name, and the company they work for, in an attempt to lure users in.

'By using people's real names, the Microsoft logo, and legitimate-sounding wording, the hackers are attempting to fool more people into stepping blindly into their bear-trap,' continued Cluley. 'Users need to be on their guard against this kind of confidence trick or they risk handing over control of their PC to hackers with criminal intentions. They should also ensure that they are downloading Microsoft security updates from Microsoft itself and not from any other website.'

Sophos recommends companies protect themselves with a consolidated solution that includes proactive detection, which can defend against the threats of viruses, spyware, spam and hackers.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo