M
MowGreen [MVP]
From: The Microsoft Security Response Center (MSRC)
http://blogs.technet.com/msrc/archive/2008/10/13/microsoft-security-e-mail-spoofs-with-malware.aspx
Microsoft *** NEVER *** emails updates. *** NEVER ***
MowGreen [MVP 2003-2009]
===============
*-343-* FDNY
Never Forgotten
===============
http://blogs.technet.com/msrc/archive/2008/10/13/microsoft-security-e-mail-spoofs-with-malware.aspx
mail, I can tell you categoricallyWe received some questions from customers about an e-mail that’s circulating that claims to be a
security e-mail from Microsoft. The e-mail comes with an attached executable, which it claims is the
latest security update, and encourages the recipient to run the attached executable so they can be
safe.
While malicious e-mails posing as Microsoft security notifications with attached malware aren’t new
(we’ve seen this problem for several years) this particular one is a bit different in that it claims
to be signed by our own Steve Lipner and has what appears to be a PGP signature block attached to it.
While those are clever attempts to increase the credibility of the
that this is not a legitimate e-mail: it is a piece of malicious spam and the attachment is malware.
Specifically, it contains Backdoor:Win32/Haxdoor.
http://www.microsoft.com/security/portal/Entry.aspx?Name=Backdoor:Win32/Haxdoor
Microsoft *** NEVER *** emails updates. *** NEVER ***
MowGreen [MVP 2003-2009]
===============
*-343-* FDNY
Never Forgotten
===============