Jump to content

Microsoft Fake Security Email


Guest lb
 Share

Recommended Posts

MICROSOFT NEVER sends you emails with patch fixes embedded in them – and you only get security alert notices if you've opted in.

So beware a particularly pernicious message that's doing the rounds. This one, claiming to come from "Microsoft Corporation Public Support" looks highly convincing, as you can see from the screenshot below, comes with an attachment called Q934821.exe which you shouldn't click under any circumstances.

In fact, and if you're concerned about holes and other Microsoft security information, you should go to this page.

Here's what the fake Microsoft email looks like, with the fake subject line "New Network Patch". The same rubbish is masquerading under different email headers, such as "Use this patch immediately", and "Newest Internet Critical Pack". It's an attack.

This also, of course, uses Microsoft logos, so the software firm can take action against the spammers

source: Inquirer

post-7-1063960495.gif

Link to comment
Share on other sites

I found an e-mail supposedely from Microsoft when I checked on Mailwasher yeterday. I was able to look at the contents on the server's site, and sure enough it told me to click to install the patch. Obviously is was deleted along with the rest of the spam. It was there waiting for me again this morning along with another thirty six spam messages.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy