N
null
I just received a surprisingly well crafted email claiming to be from
my ISP. The attackment is named "updated-password.zip". The message
begins with a very personalized and convincing looking "Dear user
<my user name>" and goes on to say that "You have successfully changed
your password .... ", etc. The return address is a legit one used by
my ISP for info purposes.
The zip contains what KAV calls Trojan.Win32.crypt.d for which Sophos
has some info here:
http://www.sophos.com/virusinfo/analyses/w32rbotaej.html
Now, how many ISPs send zip files with password info to their
customers? Yet I can see where inexperienced users might easily
fall into the trap. The message is very official-looking. So beware!
There was a clue buried in the header, in this case. There is a email
addy of another customer of my ISP with a similar user name to mine.
Since all the routing was within my ISP's domain, a quick look at the
header might also be deceiving. Also, the header shows that the zip
attackment passed through my ISP's malware (av) screening. That
fact might also deceive some users into believing the attackment is
ok.
Puh-lease! Deleted ALL unsoliticed attackments. Period.
Art
http://home.epix.net/~artnpeg
my ISP. The attackment is named "updated-password.zip". The message
begins with a very personalized and convincing looking "Dear user
<my user name>" and goes on to say that "You have successfully changed
your password .... ", etc. The return address is a legit one used by
my ISP for info purposes.
The zip contains what KAV calls Trojan.Win32.crypt.d for which Sophos
has some info here:
http://www.sophos.com/virusinfo/analyses/w32rbotaej.html
Now, how many ISPs send zip files with password info to their
customers? Yet I can see where inexperienced users might easily
fall into the trap. The message is very official-looking. So beware!
There was a clue buried in the header, in this case. There is a email
addy of another customer of my ISP with a similar user name to mine.
Since all the routing was within my ISP's domain, a quick look at the
header might also be deceiving. Also, the header shows that the zip
attackment passed through my ISP's malware (av) screening. That
fact might also deceive some users into believing the attackment is
ok.
Puh-lease! Deleted ALL unsoliticed attackments. Period.
Art
http://home.epix.net/~artnpeg