[31680] in bugtraq

home help back first fref pref prev next nref lref last post

RE: Wave of fake Official Microsoft Advisory

daemon@ATHENA.MIT.EDU (Lee Evans)
Fri Sep 19 15:59:27 2003

From: "Lee Evans" <lee@vital.co.uk>
To: "'Bruno Clermont'" <bruno@gnome.ca>, <bugtraq@securityfocus.com>
Date: Fri, 19 Sep 2003 19:17:41 +0100
Message-ID: <953E0CDD2787A94A95AA2ECE337E13640B8884@vital-exchange.vitalintranet2.co.uk>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
In-Reply-To: <1063983421.2750.32.camel@localhost>

Hi,

Following links provide further details:

http://www.theregister.co.uk/content/56/32925.html

http://securityresponse.symantec.com/avcenter/venc/data/w32.swen.a@mm.ht
ml

Regards
Lee
-- 
Lee Evans

> -----Original Message-----
> From: Mail [mailto:mail@Gnome.CA] On Behalf Of Bruno Clermont
> Sent: 19 September 2003 15:57
> To: bugtraq@securityfocus.com
> Subject: Wave of fake Official Microsoft Advisory
> 
> 
> Since this morning I start seeing tons of fake Microsoft 
> Advisories by mail. They contain a .exe attachment.
> 
> Running strings(1) on the file show it contain it's own HTML 
> mail source (and other version of the advisory), and many of 
> the stuff it try to do:
> 
> - Increment a web counter "GET 
> http://ww2.fce.vutbr.cz/bin/counter.gif/link=bacillus&width=6&
set=cnt006
HTTP/1.0"
- query a POP3 account at ww2.fce.vutbr.cz
- retrieve stuff from a newsgroup and post a message
- modify mIRC configuration
- alter some Kaaza registry keys
- probably more stuff in all the encoded content

The mail really look like an official Microsoft communication with all
those legal reference to microsoft.com website. At the rate those mail
are coming many users had already been fooled, and infection had just
started.

Some of the original mails (with .exe attachment) are available in mbox
format at http://www.gnome.ca/ms.mbox.


home help back first fref pref prev next nref lref last post