On Thu, 18 Sep 2003, at 4:10pm, [EMAIL PROTECTED] wrote:
> One has the subject line "Current Update", the other has a subject line
> "Current Microsoft Critical Upgrade".

  As others have pointed out, Microsoft **NEVER** distributes patches via
email.

  http://www.microsoft.com/technet/security/news/patch_hoax.asp

  Most likely, you have received a message sent by one of the many
self-propagating worms out there.  By making the payload appear to be a
"security fix", naive users are more likely to run it, especially with all
the press worms and viruses are getting today.  Classic Trojan-horse gambit.

  It could also be a non-worm Trojan-horse, but I doubt it.

  I like the joke that a worm could distribute itself as
"NEVER_FUCKING_OPEN_THIS.EXE" and people would still open it up and run it,
compromising their systems and spreading the worm.  Ha ha.  Only serious.

  It is worth pointing out that Linux and Unix are just as vulnerable to
this as MS-Windows.  There is absolutely zero reason someone couldn't write
a "fix-linux.sh" worm that mailed itself to people, telling them to run the
important security update.  Indeed, I'm rather surprised we haven't seen
anything like this yet.  But I'm sure it is only a matter of time until we
do.

  Once enough naive users are running Linux, we will have most of the same
security peoples Microsoft does.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.              |

_______________________________________________
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss

Reply via email to