IE 11 is not supported. For an optimal experience visit our site on another browser.

Malware E-mail Poses As Windows Security Update

E-mails posing as critical Microsoft Windows security updates are actually deploying corrupted files that can infect computers with a dangerous strand of malware.
/ Source: SecurityNewsDaily

E-mails posing as critical Microsoft Windows security updates are actually deploying corrupted files that can infect computers with a dangerous strand of malware.

The security firm Sophos is warning users to be on the lookout for e-mails titled “Update your Windows,” which contain a letter purporting to be from Steve Lipner, Microsoft’s director of security assurance. The message informs recipients that Microsoft has issued a “high priority” security update for several versions of Windows, and instructs them to download the .zip file attached to the e-mail.

Downloading the corrupted .zip file will automatically infect users’ systems with the W32/Autorun-BMF malware, which has been used in several similar Microsoft-related attacks.

“Of course, Mr. Lipner has nothing to do with the e-mails and Microsoft never distributes security updates via e-mail attachments,” said Graham Cluley, Sophos’ senior technology consultant. Cluley wrote on Sophos’ Naked Security blog that the e-mails are coming from the incorrectly spelled address "no-reply@microsft.com," a  common trick scammers use to make rogue e-mails appear real at first glance.

As always, security professionals urge users never to open suspicious links, even if they appear to come from trusted, legitimate sources.