Feeds

Lame attempt to disguise viruses as MS security update

Scumbag trick

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

It's hardly likely to fool anyone but virus writers have once again taken to disguising viruses in emails purporting to give security patches from Microsoft.

First things first: Microsoft NEVER distributes patches by email, it sends digitally-signed email alerts which details where patches can be downloaded from its site.

Besides, Microsoft is hardly likely to originate an email with the title "FW: Terrorist Emergency. Latest virus can wipe disk in minutes" or "FW: IT departments on state of HIGH ALERT", or one of eight other variants detailed in full here.

The email, which contains an attachment containing malicious code, will come forwarded to you with a message along the lines of "Just recieved [sic] this in my email. I have contacted Microsoft and they say it's real!".

Again a dead give away and anybody with any sense will hopefully have deleted the message even before this point.

In another variant of what is been christened the Redesi worm, the infection-bearing email will come with a message such as "Kev Gives great orgasms to ladeez!! -- Kev" or "A new type of Lager / Weed variant...... sorted !", or (you guessed it) eight other variants.

These virus-borne emails will come with a message body along the lines of " heh. I tell ya this is nuts ! You gotta check it out !"

In both its "Microsoft alert" and more salacious variants, the Redesi mass mailer is carried in an executable attachment (Si.exe, ReDe.exe, Disk.exe, Common.exe or UserConf.exe etc.) - yet another reason to filter out executable attachments in email.

Redesi, in both its variants, carries a nasty payload, so it's just as well it isn't spreading.

For the record, if you're daft enough to open an infected attachment on a Windows PC Redesi will use Outlook to email copies of itself to all the contacts in your address book.

On November 11, Redesi attempts to run a payload routine which writes a command to an AUTOEXEC.BAT file that launches disk formatting, with the idea of wiping a victim's c: drive when he next starts up a computer. Nasty.

Antivirus vendors are currently updating their software to detect Redesi and protection is largely in place. ®

Related Stories

'Nimda fix' Trojan disguised as security bulletin
Scumbag virus writers try to whip up 'Anthrax outbreak'
Thousands of idiots still infected by SirCam
Users haven't learned any lessons from the Love Bug
Rise in viruses within emails outpacing growth of email

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.