Feeds

‘Microsoft’ sending out dangerous new Internet worm

Or that's what somebody wants you to think

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

It has just come in that a new Internet worm called Win32.Invalid.A@mm is being sent out in an email purporting to be from Microsoft Technical Support.

The worm is dangerous and encrypts exe applications with a random key, rendering them unusable. It also checks that there is an Internet connection open and searches for files with the extension ".ht*" in your My Documents folder, takes the email addresses and forwards itself, reports anti-virus company Central Command.

It appears as follows:

From: "Microsoft Support" support@microsoft.com
Subject: Invalid SSL Certificate

Hello,

Microsoft Corporation announced that an invalid SSL certificate that web sites use is required to be installed on the user computer to use the https protocol. During the installation, the certificate causes a buffer overrun in Microsoft Internet Explorer and by that allows attackers to get access to your computer. The SSL protocol is used by many companies that require credit card or personal information so, there is a high possibility that you have this certificate installed. To avoid of being attacked by hackers, please download and install the attached patch. It is strongly recommended to install it because almost all users have this certificate installed without their knowledge.

Have a nice day,
Microsoft Corporation

Attachment: sslpatch.exe

The worm may be especially dangerous since many people are upgrading to Internet Explorer 6 and Media Player 7 at the moment, not to mention Windows XP.

Rumours that it isn't a worm at all but a service pack with a new "feature" that cuts out the middleman and just screws up the computer straight away have been vigorously denied by MS spokesgoblins. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.