Feeds

Lame attempt to disguise viruses as MS security update

Scumbag trick

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

It's hardly likely to fool anyone but virus writers have once again taken to disguising viruses in emails purporting to give security patches from Microsoft.

First things first: Microsoft NEVER distributes patches by email, it sends digitally-signed email alerts which details where patches can be downloaded from its site.

Besides, Microsoft is hardly likely to originate an email with the title "FW: Terrorist Emergency. Latest virus can wipe disk in minutes" or "FW: IT departments on state of HIGH ALERT", or one of eight other variants detailed in full here.

The email, which contains an attachment containing malicious code, will come forwarded to you with a message along the lines of "Just recieved [sic] this in my email. I have contacted Microsoft and they say it's real!".

Again a dead give away and anybody with any sense will hopefully have deleted the message even before this point.

In another variant of what is been christened the Redesi worm, the infection-bearing email will come with a message such as "Kev Gives great orgasms to ladeez!! -- Kev" or "A new type of Lager / Weed variant...... sorted !", or (you guessed it) eight other variants.

These virus-borne emails will come with a message body along the lines of " heh. I tell ya this is nuts ! You gotta check it out !"

In both its "Microsoft alert" and more salacious variants, the Redesi mass mailer is carried in an executable attachment (Si.exe, ReDe.exe, Disk.exe, Common.exe or UserConf.exe etc.) - yet another reason to filter out executable attachments in email.

Redesi, in both its variants, carries a nasty payload, so it's just as well it isn't spreading.

For the record, if you're daft enough to open an infected attachment on a Windows PC Redesi will use Outlook to email copies of itself to all the contacts in your address book.

On November 11, Redesi attempts to run a payload routine which writes a command to an AUTOEXEC.BAT file that launches disk formatting, with the idea of wiping a victim's c: drive when he next starts up a computer. Nasty.

Antivirus vendors are currently updating their software to detect Redesi and protection is largely in place. ®

Related Stories

'Nimda fix' Trojan disguised as security bulletin
Scumbag virus writers try to whip up 'Anthrax outbreak'
Thousands of idiots still infected by SirCam
Users haven't learned any lessons from the Love Bug
Rise in viruses within emails outpacing growth of email

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.