Jump to content

Worm That Pretends To Be A Microsoft Patch


Guest LB
 Share

Recommended Posts

Several security firms have identified a new worm that poses as a critical software patch from Microsoft or an antivirus update from Symantec Corp.

The worm, which for the moment goes by multiple name, including W32.Gruel@mm and W32/Fakerr@mm, modifies a slew of system settings in Microsoft Windows machines and attempts to delete a host of crucial system files.

Like most worms, Gruel/Fakerr propagates via email by lifting addresses from the Microsoft Outlook address book. However, it can also spread through the Kazaa file-sharing network. If the attached executable files are run, the worm modifies the Windows Registry, and tries to erase important system files, including all the .dll, .com, and .exe files in Windows' System32 folder.

While infection rates are currently very low and users armed with updated anti-virus software are protected, Gruel/Fakerr may get some traction because of its disguise. Two of the three variants of the worm masquerade as emails from Microsoft, and carry the subject heading "Microsoft Windows Critical Update".

Coincidentally or not, Microsoft announced three security flaws, including one it rates as critical, on Wednesday, just hours before the new worm was discovered. Users who have noticed mentions in the media of the Microsoft vulnerabilities might take it upon themselves to launch the attached file.

Gruel/Fakerr isn't the first worm to propagate via both email and peer-to-peer networks such as Kazaa. In mid-May, the Fizzer worm also attempted to spread by copying itself to Kazaa shared folders.

Link to comment
Share on other sites

  • 2 weeks later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy