Language Selection

English French German Italian Portuguese Spanish

Phishing Scam Targets Windows Update

Filed under
Microsoft
Security

A phishing scam emulating the Windows Update Service hit Australia yesterday, designed to not only emulate the update page perfectly, but circumvent current antivirus, spyware and adware programs.

The spam e-mail directs users to a page that pulls graphics from the Microsoft.com Web site and then recreates the page asking users to download a Windows update that is actually a malicious .exe file.

Director of SurfControl, Charles Heunemann, said the company discovered the virus late last night and that current heuristics and signatures used by core antivirus vendors are not picking up the malicious code.

"We are still trying to get to the bottom of it," Heunemann said.

"It is not a malicious attack for network resources but appears to send a message to the Internet advertising itself as a zombie machine - we think the .exe file pulls other code to turn the machine into a spamming server.

"The actual e-mail looks like a Microsoft e-mail but I don't think it is the practice for Microsoft to ask users to update their operating system by launching a link from an e-mail."

The virus, titled Wupdate-20050401, installs an executable file into the Windows directory and adds a startup service. When it is running the program takes up 100 percent of the CPU power, controlling the CPU by forcing it to perform continuous processes.

Microsoft security product manager Ben English said this is just one of many scams they are currently monitoring, adding that it is not unique.

"There are effective defences against these types of scams and we advise users to follow some simple guidelines," English said.

"Microsoft is aware of the SurfControl notice regarding the spoofing scam of Windows update and our advice to customers remains the same.

"Microsoft never attaches software updates to our security e-mail notifications; we never send notices about security updates or incidents until after we publish information about them on our Web site and if you suspect that an e-mail message is not legitimate, do not click any hyperlinks within it."

Sophos' Asia Pacific head of technology, Paul Ducklin, was aware of the program in question and said despite all the technology in the world, education and informed decisions by users will always be the best resort to stopping malware.

"Even if all other defences are down, with Trojan malware if a person doesn't click on it, it won't work - they all involve, to some extent, collaboration with users," Ducklin said.

"Three ways to block them include having software to prevent a suspicious program, using programs at the gateway to block .exe files and of course user education and information."

More in Tux Machines

Wine-Staging 2.0-RC5 and 'Squad' Might be Coming to GNU/Linux

  • Wine-Staging 2.0-RC5 Improves Compatibility For Origin, GOG Galaxy & More
    Wine-Staging 2.0-RC5 was released on Sunday as the newest version of this experimental/testing Wine build. This time around there are some exciting new patches. On top of re-basing off Friday's Wine 2.0-rc5 release and continuing to maintain quite a number of patches that haven't yet made their way into mainline Wine, a few more patches were added. Upstream Wine is currently under a code freeze until the 2.0 release later this month but that doesn't stop the Wine-Staging crew.
  • Release 2.0-rc5
    Wine Staging 2.0-rc5 improves the compatibility of various applications that require at least Windows Vista or Windows 7. This includes Origin, Uplay, GOG Galaxy and many more. Several bugs were fixed in the PE loader to support loading of packed executables with truncated headers and/or on-the-fly section decompression. If you are using the 64 bit version of Wine, you may also benefit from the memory manager improvements, which allow applications to reserve/allocate more than 32 GB of virtual memory. The memory allocations are now only constrained by resource limitations of the hardware / the operating system and no longer by an artificial design limit in Wine.
  • Looks like FPS game 'Squad' might be coming to Linux soon
    The game uses Unreal Engine and we know already how iffy their Linux support actually is. Hopefully they won't come across too many troubles.

Security News

  • Microsoft slates end to security bulletins in February [iophk: "further obscuring"; Ed: See this]
    Microsoft next month will stop issuing detailed security bulletins, which for nearly 20 years have provided individual users and IT professionals information about vulnerabilities and their patches. One patching expert crossed his fingers that Microsoft would make good on its pledge to publish the same information when it switches to a new online database. "I'm on the fence right now," said Chris Goettl, product manager with patch management vendor Shavlik, of the demise of bulletins. "We'll have to see [the database] in February before we know how well Microsoft has done [keeping its promise]."
  • Reflected XSS through AngularJS sandbox bypass causes password exposure of McDonald users
    By abusing an insecure cryptographic storage vulnerability (link) and a reflected server cross-site-scripting vulnerability (link) it is possible to steal and decrypt the password from a McDonald's user. Besides that, other personal details like the user's name, address & contact details can be stolen too.
  • DragonFlyBSD Installer Updated To Support UEFI System Setup
    DragonFlyBSD has been working on its (U)EFI support and with the latest Git code its installer now has basic UEFI support.

A Look At The Huge Performance Boosts With Nouveau Mesa 17.0-devel On Maxwell

Landing this week in Mesa 17.0-devel Git was OpenGL 4.3 for NVC0 Maxwell and a big performance boost as well for these GeForce GTX 750 / 900 series NVIDIA "Maxwell" graphics processors. Here are some before/after benchmarks of the performance improvements, which the patch cited as "1.5~3.5x better", when testing a GeForce GTX 750 Ti and GTX 980. Read more Also: Fresh Tests Of Intel Beignet OpenCL

Q4OS 1.8.2, Orion

New version 1.8.2 is based on the the most recent release of stable Debian Jessie 8.7, important security patches have been applied and core system packages have been updated. Q4OS Update manager has been rewritten from scratch to provide a robust and reliable tool for safe system upgrades. Other Q4OS specific fixes and under the hood improvements are delivered as usual. All the updates are immediately available for existing Q4OS users from the regular Q4OS repositories. Most attention is now focused on the development of the testing Q4OS 'Scorpion' version 2.2, based on Debian 9 Stretch. Q4OS 2.2 Scorpion continues to be under development so far, and it will stay as long as Debian Stretch will be testing, the release date is preliminarily scheduled at about the turn of April and May 2017. Q4OS 'Scorpion' will be supported at least five years from the official release date. Read more