IoT
News
News
5/30/2006
02:07 PM
50%
50%

Trojan ID Thieves Pose As Microsoft Patches

A pair of Trojans posing as Microsoft patches or updates is on the loose, security firms said Tuesday.

A pair of Trojans posing as Microsoft patches or updates are on the loose, security firms said Tuesday.

According to U.K.-based Sophos, the Trojan horse "BeastPWS-C" starts with a spoofed e-mail from Microsoft that claims a new vulnerability in the WinLogon Service is out and about. (WinLogon is the log-in service for Windows NT, 2000, and XP.) The spammed message includes a link to a purported patch.

"Please click the link below to download the patch and protect your computer against WinLogon attacks," the spam reads.

Users who click on the URL actually download the Trojan, not a patch. BeastPWS-C, said Sophos, logs keystrokes and sends them to a hacker's e-mail account.

"People are slowly learning that Microsoft does not e-mail out security fixes as attachments, but they also need to learn to be careful of blindly clicking on links to download fixes," said Graham Cluley, senior technology consultant at Sophos, in a statement.

The spam's first line -- "Microsoft Cooporation" [sic] -- is a dead give-away that the message is bogus, Cluley added.

The second Trojan, dubbed "Sinowal.u" by Moscow-based Kaspersky Labs, takes a different tack in duping users. The German-language spam claims to be from Microsoft Windows Update, and includes an attached file -- supposedly an update -- that must be run, reads the message, to protect against a new worm. The file is, of course, the Trojan, which lays in wait on the compromised PC, records usernames and passwords -- targeting some banking sites specifically -- and then transmits them to the attacker.

By Kaspersky's account, Sinowal.u also inserts custom HTML code into the pages of some banking sites to create a customized pop-up which asks the user for his or her personal information.

Microsoft's policy, which the company has repeated numerous times, is that "We never attach software updates to our security e-mail notifications."

To verify the legitimacy of messages such as the one used by the makers of BeastPWS-C, Microsoft notes that "We never send notices about security updates or incidents until after we publish information about them on our Web site. Check the Security site on Microsoft.com to see whether the information is listed there."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of July 24, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.