Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Malware Purveyors Exploit The Release Of Microsoft’s August Security Bulletin

Security researchers belonging to BitDefender the security company caution that a fresh campaign is going on, distributing malware by taking advantage of the noise that the recent security bulletin from Microsoft caused.

Familiarly, Microsoft issues fresh security patches on each 2nd Tuesday of every month. Consequently, the industry has named this day 'Patch Tuesday.'

On August 10, 2010, Microsoft in its most recent cycle released a record number of 14 security fixes, with 8 deemed critical, that take care of 34 flaws reported to have inflicted its line of products.

Apparently, cyber-criminals are attempting at taking advantage of people's faith in Microsoft. For, BitDefender's researchers caught a fresh surge of spam mails pretending to be from Microsoft's Security Team. These e-mails display the header, "Microsoft Patch."

Actually, the security team studied a fresh 0-day vulnerability, which makes Windows users vulnerable to code execution or blue-screen crash attacks. As a result, the software giant fixed 34 security flaws within its latest security update. This update, states the spam mail, can be downloaded via clicking the URL given in the message. ZDNet.om reported this on August 13, 2010.

Say the BitDefender researchers, in case anyone who received the spam mail attempts at clicking the win.exe web-link for downloading the update, he will get a fine spam bot, which BitDefender detects as Trojan.SpamBot.CAL.

When planted, the infected computer will give a remote hacker access and manipulative power over itself. In time, it will be converted into a spamming system distributing junk e-mails via Yahoo's Simple Mail Transfer Protocol (SMTP) server.

And suppose the security researchers manage to deactivate the mentioned web-link, there's one back-up link which's already included in the unsolicited message, the BitDefender researchers outlined.

This second link contains a malware identified as 'Trojan.Downloader.Agent.ABFG' that brings forth various crooks over the victimized PC.

In the end, security specialists suggest computer users that if they happen to get these spam mails, it will be more prudent for them to visit Microsoft's official website for downloading the updates. For, people widely know that patches and updates don't usually come via e-mails having implanted web-links.

Related article: Malware Authors Turn More Insidious

» SPAMfighter News - 20-08-2010

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next