[AusNOG] Trojan "MS Windows TCP/IP Patch" spam run
matthew at auscert.org.au
matthew at auscert.org.au
Tue Aug 1 15:10:47 EST 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Greetings all,
We've had a few reports of a spam run for a fake MS Windows TCP/IP Patch
(as below) that leads to a trojan site. Anyone else seeing much of this?
Any feedback appreciated.
- -- Matthew McGlashan --
Coordination Centre Team Leader | Hotline: +61 7 3365 4417
Australian Computer Emergency Response Team | Direct: +61 7 3365 7924
(AusCERT) | Fax: +61 7 3365 7031
The University of Queensland | WWW: www.auscert.org.au
Qld 4072 Australia | Email: auscert at auscert.org.au
Subject: Microsoft Windows TCP/IP Protocol Security Issue - Patch Required
From: Microsoft Corporation <support at microsoft.com>
Date: 31 Jul 2006 19:31:57 +0200
To: auscert at auscert.org.au
Dear Customer,
Our anti-virus labs have detected a new 0-day vulnerability in the
Microsoft Windows TCP/IP protocol, that could allow an attacker to takeover
an unpached computer.We dont have too many details, since we have recently
become aware of the vulnerability, but if patch is not applied as soon as
possible, you risk your computer to be exploited.Because the vulnerability
affects the kernel of Microsoft Windows, we cannot provide the patch using
the Microsoft Update Service, so we have decided to notify all our
customers that have registered their Microsoft Windows Operating System
about this new threat.
Because the security of our customers is very important to us, we have
developed a patch to fix the kernel of Microsoft Windows, and to prevent
your computer from being attacked.
Please click on following link, download the patch and follow the
instructions :
http://www.microsoft.com/security/tcp-ip/download.php?country=AU,234,242,211
1.Download the patch on your Desktop.
2.Run the patch.
3.Reboot your computer.
Each customer has an unique link to download the patch that will expire
in 24 hours, so you have to apply within 24 hours after you receive this
email.
If you fail to do so, you risk your computer to be attacked and exploited
by hackers.
Thank you
Microsoft Corp.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (FreeBSD)
Comment: http://www.auscert.org.au/render.html?it=1967
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBRM65yCh9+71yA2DNAQLbEgP+Kwuu5ldbrEkyYu1jmgCenjGIF7cCSDCa
ht7GQOGZL5ss9ZsZS2SfYk3Hi4v5NhtJ47KWmFumputa/H4chCAZ3bFxIzMsvO2+
IeP+7YVqQgXM3sXVd4HNAHRZlmY4SYfDrJ7RX836lmYtOionUg3NxhruJKV25rEc
p9lpFhPs5QY=
=dQxq
-----END PGP SIGNATURE-----
More information about the AusNOG
mailing list