[FARC] Just in Time for Halloween - Another Windows Worm
Scott Galbraith
scottg at n3ok.com
Thu Oct 30 09:52:41 EST 2008
Bob, et al, I had to get another copy of the messae I was referring to
from my sister, who works in DHS. (I had deleted her original since the
few windoze machines I have cursed myself with are isolated from the
outside world.)
Here's the warning:
/*Subject:*/ Microsoft "Patch Tuesday" email is a hoax...and a trojan
*Microsoft "Patch Tuesday" email is a hoax...and a trojan*_
_/Windows 2000, Windows XP and Windows Vista
<http://thundercloud.net/infoave/answers/2008/patch-tuesday.htm>/
Once again criminals and miscreants are banking on uninformed Windows
users to help spread a new Trojan by email. The email appears to be from
Microsoft, and even claims to be digitally signed by Microsoft. This new
email hoax includes a new twist - quoting a real Microsoft employee,
Steve Lipner, in an attempt to add credibility to it.
Premium readers are reminded that Microsoft never sends patches by
email; they never have and they never will. In fact, no major company
will ever send out a mass mailing with executable files (files that run
when clicked) attached. If you receive an email that looks like it came
from Microsoft with an attached file, delete the email immediately.
Sometimes, even though we know better, we get tired, or pre-occupied,
and don't think things though before we do things. So even the
well-informed can get stung by hoaxes like these. That's why it's
important that we remind you that this email is being sent by the
millions - so the likelihood that you'll see it soon is high.
Here is more information from a Microsoft source:
“We received some questions from customers about an e-mail that’s
circulating that claims to be a security
<http://thundercloud.net/infoave/answers/2008/patch-tuesday.htm> e-mail
from Microsoft. The e-mail comes with an attached executable, which it
claims is the latest security update
<http://thundercloud.net/infoave/answers/2008/patch-tuesday.htm>, and
encourages the recipient to run the attached executable so they can be
safe. While malicious e-mails posing as Microsoft security notifications
with attached malware aren’t new (we’ve seen this problem for several
years) this particular one is a bit different in that it claims to be
signed by our own Steve Lipner and has what appears to be a PGP
signature block attached to it. While those are clever attempts to
increase the credibility of the mail, I can tell you categorically that
this is not a legitimate e-mail: it is a piece of malicious spam and the
attachment is malware. Specifically, it contains Backdoor:Win32/Haxdoor.
Furthermore, this backdoor opens several TCP ports that allow remote
attackers to connect to the compromised PC and execute files, steal
information from it, or upload and download files. The attachment’s file
name varies, but uses the convention(al) KBxxxxxx.exe, where xxxxxx is a
random 6-digit number. Below are some of the file names we’ve seen, and
are being used:
KB199250.exe
KB246586.exe
KB535548.exe
KB572906.exe
KB763412.exe..."
Those file names are typical Microsoft "KILOBYTE" (KB) file names. It
does not matter of course; a file can be named anything the developer
wants to name it. This is a very well planned and executed hoax - and
one that is very dangerous to your computer - and your personal
information. Be on your toes and remember - Microsoft never sends
patches or executable files by email. Delete any email that appears to
be from Microsoft which contains an attachment. You can be sure, no
matter how authentic it may look, it is not from Microsoft.
As we remind you almost every week - keep your anti-virus and
anti-spyware
<http://thundercloud.net/infoave/answers/2008/patch-tuesday.htm> updated
frequently. An outdated anti-virus or anti-spyware program
<http://thundercloud.net/infoave/answers/2008/patch-tuesday.htm> is
almost as bad as not having any anti-spyware or anti-virus protection
<http://thundercloud.net/infoave/answers/2008/patch-tuesday.htm>. Scan
your computer at least once a week using a good online anti-virus
scanner <http://thundercloud.net/infoave/answers/2008/patch-tuesday.htm>
to ensure your anti-virus software is doing its job. Use common sense
and always carefully consider opening any attachments that come via
email. Unless you were expecting an attachments and you are 100% certain
you know who it is from, do n ot open it. Forewarned is forearmed.
Bob Moroney wrote:
> Kirk,
> Yes, the KB958644 is the MS patch for the worm and variants that have
> been observed recently. Your anti virus program may also be looking
> for signs of the worm, but apparently MS had to plug the hole that the
> worm exploited to prevent an infection. Thus the patch.
> I'm not sure what Scott was referring to, although there are plenty of
> hoaxes out there, as a visit to snopes.com will confirm, if you look
> under the "Computer" listing. There was a phishing hoax a few years
> back that looked like an official Microsoft email that sucked some
> folks in, similar to the ones you probably get every day from various
> banks and credit unions.
> 73, Bob K9CMR
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Kirk Talbott wrote:
More information about the FARC
mailing list