Language Selection

English French German Italian Portuguese Spanish

Phoney Microsoft mail causes concern

Filed under
Security

A phoney email purporting to come from Microsoft is installing Trojan software on computers around the world.

The mail was sent out by spammers and asks the reader to install a Microsoft update. It has a link to a realistic looking Microsoft update page but the file installed, named Wupdate-20050401.exe, turns control of the PC over to the spammer.

"The email won't be picked up through anti-spyware software because the .exe file does not contain spyware signatures that would be used to identify it as potentially harmful," commented Martino Corbelli from SurfControl, who first detected the email in Australia this morning.

"Anti-spyware software tends to scan URLs and attachments in suspicious emails, but because none of the recognised spyware signatures are present in the .exe here, there's no way this approach could identify the threat.?

Once installed the software will run, taking up 100 percent of the CPU power by forcing it to perform continuous processes. It also allows the PC to be turned into a spam server remotely.

Companies are advised to inform staff of the mail and lock down PCs to stop any files being installed for the time being. Internet filtering companies have been informed and are blocking the false site.

Source.

More in Tux Machines

The skinny on thin Linux

Much commotion has surrounded this column in the past few weeks. Not even counting the systemd discussion, my call for a server-only Linux distribution that does not support any desktop applications or frameworks caused a tizzy, mostly from folks who couldn't quite grasp that I wasn't only talking about not selecting desktop packages during installation. Read more

CipherShed: A replacement for TrueCrypt

While the Open Crypt Audit Project, headed by cryptographer Matthew Green and Kenneth White, Principal Scientist at Social & Scientific Systems, has been considering whether to take over the development of TrueCrypt and is working on the second phase of the audit process (a thorough analysis of the code responsable for the actual encryption process), one of TrueCrypt's developers has expressed his disapproval of a project that would fork the software. Read more

Red Hat CEO announces a shift from client-server to cloud computing

Red Hat is in the midst of changing its image from a top Linux company to the future king of cloud computing. CEO Jim Whitehurst told me in 2011 that the Platform-as-a-Service (PaaS) cloud would be Red Hat's future. Today in a blog posting, Whitehurst underlined this shift from Linux to OpenStack. Read more

PyPy 2.4 - Snow White

PyPy is a very compliant Python interpreter, almost a drop-in replacement for CPython 2.7. It’s fast (pypy 2.4 and cpython 2.7.x performance comparison) due to its integrated tracing JIT compiler. This release supports x86 machines on most common operating systems (Linux 32/64, Mac OS X 64, Windows, and OpenBSD), as well as newer ARM hardware (ARMv6 or ARMv7, with VFPv3) running Linux. Read more