Bogus Security Update e-mail

  • Thread starter Thread starter Corey
  • Start date Start date
C

Corey

I keep getting this e-mail that claims to be Microsoft Security Update.
It's pretty obvious it's not do to the reply address and the path it took to
get to me. But it is a very professional looking e-mail with several
working links to within Microsoft.

My question is, can I forward this e-mail to someone who may be able to
track down and stop the culprit?

Thanks,
Corey

Here are the properties of the e-mail:

X-Message-Info: JGTYoYF78jEHjJx36Oi8+YDSEg8qKPPD
Received: from mpls-qmqp-01.inet.qwest.net ([63.231.195.112]) by
mc1-f27.hotmail.com with Microsoft SMTPSVC(5.0.2195.6713);
Wed, 12 Nov 2003 18:05:35 -0800
Received: (qmail 70710 invoked by uid 0); 13 Nov 2003 02:05:33 -0000
Received: from unknown (63.231.195.1)
by mpls-qmqp-01.inet.qwest.net with QMQP; 13 Nov 2003 02:05:33 -0000
Received: from 63-227-150-227.omah.qwest.net (HELO mrspn) (63.227.150.227)
by mpls-pop-01.inet.qwest.net with SMTP; 13 Nov 2003 02:05:12 -0000
From: "Security Bulletin" <[email protected]>
To: (e-mail address removed)
SUBJECT: New Critical Update
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="krfbtaddmxa"
Return-Path: (e-mail address removed)
Message-ID: <[email protected]>
X-OriginalArrivalTime: 13 Nov 2003 02:05:35.0664 (UTC)
FILETIME=[A04F5300:01C3A98A]
Date: 12 Nov 2003 18:05:35 -0800
 
No need, Corey. Microsoft is well aware of this particular exploit and many
others.

You may have heard on the national tv news or in newspapers within the last
few days that Microsoft has "put up" a $5 million reward fund with probably
goodly sums paid to persons who are instrumental in the apprehension and
conviction of the virus originators.
 
Back
Top