Several security companies have issued a warning that a fake Microsoft Security upgrade email is displayed on the Internet. Users can automatically download and run malicious code after opening the website to which the email points.
According to foreign media reports, the title of the spam is "Microsoft Security Bulletin MS07-0065-Emergency upgrade", the mail source shows updat@microsfot.com, mail said users will download microsoft security upgrade report released in June 18, and provide a URL link. The email said: "A new zero-day attack vulnerability is exposed, and users running Microsoft OUTLOOK will be affected. Attackers can exploit this vulnerability to control users' PC systems ." The email claimed that 0.1 million PCs have been hijacked.
In fact, this email introduces users to one of multiple malicious websites. When a webpage is opened, the trojan program is automatically downloaded. Graham krwe, analyst at Sophos, a security agency, said in a statement: "Microsoft has published Software Security announcements in common, and malicious hackers have used such empty files, by using your real name and Microsoft logo, and seemingly gibberish language, you can try to direct more users to a well-designed trap."
The Internet storm center under the SANS Institute and Symantec's DeepSight network also issued a warning against the malicious email.
James blacovich, a professor of psychology at the University of California, said: "The legitimate information of fake well-known websites is a new trick of spam senders ". The above malicious email points to the website named "genuine Microsoft software", which is one of the content that Microsoft strongly advocates for users. Microsoft will also use the real user name in the relevant information. This malicious email contains a fake product registration code.
However, careful users will still find clues, of course not because of spam misspelling, but the so-called security upgrade file code "MS07-0065", until now this year, microsoft's security upgrade to achieve MS07-035.