What the heck?

2010-06-01 Thread David McSpadden
Ok so my users are getting this right now.  I have blocked the ip with
Ironport and sent the email saying not to open it but to delete it.

Anyone else getting this crap today?

 

 

 

 

 

 

If you already received this information before and action has been
taken, then please ignore.

 

This important information about a security vulnerability requires your
immediate attention!

 

All systems detected using Adobe products have been sent out this e-mail
and are all requested to update their systems urgently.

Kindly follow the instructions in the e-mail as forwarded below.

 

Failure to comply will result in all financial and non financial loss to
be a liability of the receiver.

 

Please treat this e-mail as a matter of urgency. No further follow up
warning will be sent.

 

**This e-mail is a computer generated e-mail from ad...@imcu.com and
does not require a reply**

 

 

--- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---

From: Richard Barnett rbarn...@adobe.com

To: Administrator ad...@imcu.com

Subject: Adobe Security Update

Date: Friday, May 28, 2010, 11:24 AM

 

Broadcast message:

Adobe has issued a directive which states that all systems running their
software should be patched for the latest security glitch.

The CVE-2010-0193 Denial of Service Vulnerability has recently been
discovered on several systems running the previously released version of
the software, which has been further documented on security sites such
as http://www.securityfocus.com/bid/39524

It is strongly advised that all systems running the Adobe software is
updated with the latest security patch to avoid further situations
hampering the security and integrity of the system. Failure to follow
the directive would mean that any loss which occurs due to the
negligence will be a liability of the company and not Adobe. The link to
update the system with the latest patch and instructions are provided
below:

 

Download the instructions here: http://190.144.101.204/adobe/update.pdf
(requires Adobe Acrobat Reader).

To update your system, download the installation file here:
http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).

(Read first the instructions before updating the system)

 

 

Your urgent attention is most appreciated,

 

Richard Barnett

Adobe Risk Management

345 Park Avenue

San Jose, CA 95110-2704

Tel: 408-587-3932

rbarn...@adobe.com

 

---

Disclaimer: 

This e-mail message and information contained in or attached to this
message is privileged, confidential, and protected from disclosure and
is intended only for the person or entity to which it is addressed. Any
review, re-transmission, dissemination, printing or other use of, or
taking of any action in reliance upon this information by persons or
entities other than the intended recipient is prohibited.

 

 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: What the heck?

2010-06-01 Thread Erik Goldoff
Hmmm, the numerical IP address later in the body of the message seems to
belong to someone in Bogota Columbia
I wasn't aware that Adobe was HQ'd in Columbia nor distributed vital
security information and patches from that country 

MORE social engineering.
On Tue, Jun 1, 2010 at 1:34 PM, David McSpadden dav...@imcu.com wrote:

  Ok so my users are getting this right now.  I have blocked the ip with
 Ironport and sent the email saying not to open it but to delete it.

 Anyone else getting this crap today?













 If you already received this information before and action has been taken,
 then please ignore.



 This important information about a security vulnerability requires your
 immediate attention!



 All systems detected using Adobe products have been sent out this e-mail
 and are all requested to update their systems urgently.

 Kindly follow the instructions in the e-mail as forwarded below.



 Failure to comply will result in all financial and non financial loss to be
 a liability of the receiver.



 Please treat this e-mail as a matter of urgency. No further follow up
 warning will be sent.



 **This e-mail is a computer generated e-mail from ad...@imcu.com and does
 not require a reply**





 --- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---

 From: Richard Barnett rbarn...@adobe.com

 To: Administrator ad...@imcu.com

 Subject: Adobe Security Update

 Date: Friday, May 28, 2010, 11:24 AM



 Broadcast message:

 Adobe has issued a directive which states that all systems running their
 software should be patched for the latest security glitch.

 The CVE-2010-0193 Denial of Service Vulnerability has recently been
 discovered on several systems running the previously released version of the
 software, which has been further documented on security sites such as
 http://www.securityfocus.com/bid/39524

 It is strongly advised that all systems running the Adobe software is
 updated with the latest security patch to avoid further situations hampering
 the security and integrity of the system. Failure to follow the directive
 would mean that any loss which occurs due to the negligence will be a
 liability of the company and not Adobe. The link to update the system with
 the latest patch and instructions are provided below:



 Download the instructions here: 
 http://190.144.101.204/adobe/update.pdf(requires Adobe Acrobat Reader).

 To update your system, download the installation file here:
 http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).

 (Read first the instructions before updating the system)





 Your urgent attention is most appreciated,



 Richard Barnett

 Adobe Risk Management

 345 Park Avenue

 San Jose, CA 95110-2704

 Tel: 408-587-3932

 rbarn...@adobe.com



 ---

 Disclaimer:

 This e-mail message and information contained in or attached to this
 message is privileged, confidential, and protected from disclosure and is
 intended only for the person or entity to which it is addressed. Any review,
 re-transmission, dissemination, printing or other use of, or taking of any
 action in reliance upon this information by persons or entities other than
 the intended recipient is prohibited.













~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: What the heck?

2010-06-01 Thread David W. McSpadden
Phone number is disconnected too.  Adobe is having a rough month.

 

 

  _  

From: Erik Goldoff [mailto:egold...@gmail.com] 
Sent: Tuesday, June 01, 2010 1:48 PM
To: NT System Admin Issues
Subject: Re: What the heck?

 

Hmmm, the numerical IP address later in the body of the message seems to
belong to someone in Bogota Columbia 
I wasn't aware that Adobe was HQ'd in Columbia nor distributed vital
security information and patches from that country 

 

MORE social engineering.

On Tue, Jun 1, 2010 at 1:34 PM, David McSpadden dav...@imcu.com wrote:

Ok so my users are getting this right now.  I have blocked the ip with
Ironport and sent the email saying not to open it but to delete it.

Anyone else getting this crap today?

 

 

 

 

 

 

If you already received this information before and action has been taken,
then please ignore.

 

This important information about a security vulnerability requires your
immediate attention!

 

All systems detected using Adobe products have been sent out this e-mail and
are all requested to update their systems urgently.

Kindly follow the instructions in the e-mail as forwarded below.

 

Failure to comply will result in all financial and non financial loss to be
a liability of the receiver.

 

Please treat this e-mail as a matter of urgency. No further follow up
warning will be sent.

 

**This e-mail is a computer generated e-mail from ad...@imcu.com and does
not require a reply**

 

 

--- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---

From: Richard Barnett rbarn...@adobe.com

To: Administrator ad...@imcu.com

Subject: Adobe Security Update

Date: Friday, May 28, 2010, 11:24 AM

 

Broadcast message:

Adobe has issued a directive which states that all systems running their
software should be patched for the latest security glitch.

The CVE-2010-0193 Denial of Service Vulnerability has recently been
discovered on several systems running the previously released version of the
software, which has been further documented on security sites such as
http://www.securityfocus.com/bid/39524

It is strongly advised that all systems running the Adobe software is
updated with the latest security patch to avoid further situations hampering
the security and integrity of the system. Failure to follow the directive
would mean that any loss which occurs due to the negligence will be a
liability of the company and not Adobe. The link to update the system with
the latest patch and instructions are provided below:

 

Download the instructions here: http://190.144.101.204/adobe/update.pdf
(requires Adobe Acrobat Reader).

To update your system, download the installation file here:
http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).

(Read first the instructions before updating the system)

 

 

Your urgent attention is most appreciated,

 

Richard Barnett

Adobe Risk Management

345 Park Avenue

San Jose, CA 95110-2704

Tel: 408-587-3932

rbarn...@adobe.com

 

---

Disclaimer: 

This e-mail message and information contained in or attached to this message
is privileged, confidential, and protected from disclosure and is intended
only for the person or entity to which it is addressed. Any review,
re-transmission, dissemination, printing or other use of, or taking of any
action in reliance upon this information by persons or entities other than
the intended recipient is prohibited.

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: What the heck?

2010-06-01 Thread Ben Scott
On Tue, Jun 1, 2010 at 1:47 PM, Erik Goldoff egold...@gmail.com wrote:
 I wasn't aware that Adobe was HQ'd in Columbia nor distributed vital
 security information and patches from that country 

  I particularly like the PDF with the spoofed Adobe security
advisory.  It looks just like something a company would put out, and
certainly Adobe loves PDF.

  The use of a bare IP address in the URLs is a dead giveaway, though.
 If they had employed some URL obfuscation techniques, it would be
much more difficult to spot at first glance.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: What the heck?

2010-06-01 Thread David W. McSpadden
Looks like they are down now.

-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Tuesday, June 01, 2010 2:07 PM
To: NT System Admin Issues
Subject: Re: What the heck?

On Tue, Jun 1, 2010 at 1:47 PM, Erik Goldoff egold...@gmail.com wrote:
 I wasn't aware that Adobe was HQ'd in Columbia nor distributed vital
 security information and patches from that country 

  I particularly like the PDF with the spoofed Adobe security
advisory.  It looks just like something a company would put out, and
certainly Adobe loves PDF.

  The use of a bare IP address in the URLs is a dead giveaway, though.
 If they had employed some URL obfuscation techniques, it would be
much more difficult to spot at first glance.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: What the heck?

2010-06-01 Thread Erik Goldoff
well, with known pdf exploits, I wasn't about to click the link to open
*their* document 

On Tue, Jun 1, 2010 at 2:07 PM, Ben Scott mailvor...@gmail.com wrote:

 On Tue, Jun 1, 2010 at 1:47 PM, Erik Goldoff egold...@gmail.com wrote:
  I wasn't aware that Adobe was HQ'd in Columbia nor distributed vital
  security information and patches from that country 

  I particularly like the PDF with the spoofed Adobe security
 advisory.  It looks just like something a company would put out, and
 certainly Adobe loves PDF.

  The use of a bare IP address in the URLs is a dead giveaway, though.
  If they had employed some URL obfuscation techniques, it would be
 much more difficult to spot at first glance.

 -- Ben

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: What the heck?

2010-06-01 Thread Alex Eckelberry
The exe below is malware (I suppose everyone figured that out).


From: David McSpadden [mailto:dav...@imcu.com]
Sent: Tuesday, June 01, 2010 1:34 PM
To: NT System Admin Issues
Subject: What the heck?

Ok so my users are getting this right now.  I have blocked the ip with Ironport 
and sent the email saying not to open it but to delete it.
Anyone else getting this crap today?






If you already received this information before and action has been taken, then 
please ignore.

This important information about a security vulnerability requires your 
immediate attention!

All systems detected using Adobe products have been sent out this e-mail and 
are all requested to update their systems urgently.
Kindly follow the instructions in the e-mail as forwarded below.

Failure to comply will result in all financial and non financial loss to be a 
liability of the receiver.

Please treat this e-mail as a matter of urgency. No further follow up warning 
will be sent.

**This e-mail is a computer generated e-mail from ad...@imcu.com and does not 
require a reply**


--- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---
From: Richard Barnett rbarn...@adobe.com
To: Administrator ad...@imcu.com
Subject: Adobe Security Update
Date: Friday, May 28, 2010, 11:24 AM

Broadcast message:
Adobe has issued a directive which states that all systems running their 
software should be patched for the latest security glitch.
The CVE-2010-0193 Denial of Service Vulnerability has recently been discovered 
on several systems running the previously released version of the software, 
which has been further documented on security sites such as 
http://www.securityfocus.com/bid/39524
It is strongly advised that all systems running the Adobe software is updated 
with the latest security patch to avoid further situations hampering the 
security and integrity of the system. Failure to follow the directive would 
mean that any loss which occurs due to the negligence will be a liability of 
the company and not Adobe. The link to update the system with the latest patch 
and instructions are provided below:

Download the instructions here: http://190.144.101.204/adobe/update.pdf 
(requires Adobe Acrobat Reader).
To update your system, download the installation file here: 
http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).
(Read first the instructions before updating the system)


Your urgent attention is most appreciated,

Richard Barnett
Adobe Risk Management
345 Park Avenue
San Jose, CA 95110-2704
Tel: 408-587-3932
rbarn...@adobe.com

---
Disclaimer:
This e-mail message and information contained in or attached to this message is 
privileged, confidential, and protected from disclosure and is intended only 
for the person or entity to which it is addressed. Any review, re-transmission, 
dissemination, printing or other use of, or taking of any action in reliance 
upon this information by persons or entities other than the intended recipient 
is prohibited.








~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: What the heck?

2010-06-01 Thread David W. McSpadden
Did Ninja catch it or did you have to scan it manually??



 

  _  

From: Alex Eckelberry [mailto:al...@sunbelt-software.com] 
Sent: Tuesday, June 01, 2010 2:34 PM
To: NT System Admin Issues
Subject: RE: What the heck?

 

The exe below is malware (I suppose everyone figured that out). 

 

 

From: David McSpadden [mailto:dav...@imcu.com] 
Sent: Tuesday, June 01, 2010 1:34 PM
To: NT System Admin Issues
Subject: What the heck?

 

Ok so my users are getting this right now.  I have blocked the ip with
Ironport and sent the email saying not to open it but to delete it.

Anyone else getting this crap today?

 

 

 

 

 

 

If you already received this information before and action has been taken,
then please ignore.

 

This important information about a security vulnerability requires your
immediate attention!

 

All systems detected using Adobe products have been sent out this e-mail and
are all requested to update their systems urgently.

Kindly follow the instructions in the e-mail as forwarded below.

 

Failure to comply will result in all financial and non financial loss to be
a liability of the receiver.

 

Please treat this e-mail as a matter of urgency. No further follow up
warning will be sent.

 

**This e-mail is a computer generated e-mail from ad...@imcu.com and does
not require a reply**

 

 

--- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---

From: Richard Barnett rbarn...@adobe.com

To: Administrator ad...@imcu.com

Subject: Adobe Security Update

Date: Friday, May 28, 2010, 11:24 AM

 

Broadcast message:

Adobe has issued a directive which states that all systems running their
software should be patched for the latest security glitch.

The CVE-2010-0193 Denial of Service Vulnerability has recently been
discovered on several systems running the previously released version of the
software, which has been further documented on security sites such as
http://www.securityfocus.com/bid/39524

It is strongly advised that all systems running the Adobe software is
updated with the latest security patch to avoid further situations hampering
the security and integrity of the system. Failure to follow the directive
would mean that any loss which occurs due to the negligence will be a
liability of the company and not Adobe. The link to update the system with
the latest patch and instructions are provided below:

 

Download the instructions here: http://190.144.101.204/adobe/update.pdf
(requires Adobe Acrobat Reader).

To update your system, download the installation file here:
http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).

(Read first the instructions before updating the system)

 

 

Your urgent attention is most appreciated,

 

Richard Barnett

Adobe Risk Management

345 Park Avenue

San Jose, CA 95110-2704

Tel: 408-587-3932

rbarn...@adobe.com

 

---

Disclaimer: 

This e-mail message and information contained in or attached to this message
is privileged, confidential, and protected from disclosure and is intended
only for the person or entity to which it is addressed. Any review,
re-transmission, dissemination, printing or other use of, or taking of any
action in reliance upon this information by persons or entities other than
the intended recipient is prohibited.

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: What the heck?

2010-06-01 Thread Erik Goldoff
I was figuring both the EXE  *and* the PDF were grin

On Tue, Jun 1, 2010 at 2:33 PM, Alex Eckelberry
al...@sunbelt-software.comwrote:

  The exe below is malware (I suppose everyone figured that out).





 *From:* David McSpadden [mailto:dav...@imcu.com]
 *Sent:* Tuesday, June 01, 2010 1:34 PM

 *To:* NT System Admin Issues
 *Subject:* What the heck?



 Ok so my users are getting this right now.  I have blocked the ip with
 Ironport and sent the email saying not to open it but to delete it.

 Anyone else getting this crap today?













 If you already received this information before and action has been taken,
 then please ignore.



 This important information about a security vulnerability requires your
 immediate attention!



 All systems detected using Adobe products have been sent out this e-mail
 and are all requested to update their systems urgently.

 Kindly follow the instructions in the e-mail as forwarded below.



 Failure to comply will result in all financial and non financial loss to be
 a liability of the receiver.



 Please treat this e-mail as a matter of urgency. No further follow up
 warning will be sent.



 **This e-mail is a computer generated e-mail from ad...@imcu.com and does
 not require a reply**





 --- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---

 From: Richard Barnett rbarn...@adobe.com

 To: Administrator ad...@imcu.com

 Subject: Adobe Security Update

 Date: Friday, May 28, 2010, 11:24 AM



 Broadcast message:

 Adobe has issued a directive which states that all systems running their
 software should be patched for the latest security glitch.

 The CVE-2010-0193 Denial of Service Vulnerability has recently been
 discovered on several systems running the previously released version of the
 software, which has been further documented on security sites such as
 http://www.securityfocus.com/bid/39524

 It is strongly advised that all systems running the Adobe software is
 updated with the latest security patch to avoid further situations hampering
 the security and integrity of the system. Failure to follow the directive
 would mean that any loss which occurs due to the negligence will be a
 liability of the company and not Adobe. The link to update the system with
 the latest patch and instructions are provided below:



 Download the instructions here: 
 http://190.144.101.204/adobe/update.pdf(requires Adobe Acrobat Reader).

 To update your system, download the installation file here:
 http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).

 (Read first the instructions before updating the system)





 Your urgent attention is most appreciated,



 Richard Barnett

 Adobe Risk Management

 345 Park Avenue

 San Jose, CA 95110-2704

 Tel: 408-587-3932

 rbarn...@adobe.com



 ---

 Disclaimer:

 This e-mail message and information contained in or attached to this
 message is privileged, confidential, and protected from disclosure and is
 intended only for the person or entity to which it is addressed. Any review,
 re-transmission, dissemination, printing or other use of, or taking of any
 action in reliance upon this information by persons or entities other than
 the intended recipient is prohibited.

















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: What the heck?

2010-06-01 Thread Alex Eckelberry
Actually the PDF doesn't appear malicious.  But I haven't had the labs look at 
it yet.

From: Erik Goldoff [mailto:egold...@gmail.com]
Sent: Tuesday, June 01, 2010 2:42 PM
To: NT System Admin Issues
Subject: Re: What the heck?

I was figuring both the EXE  *and* the PDF were grin
On Tue, Jun 1, 2010 at 2:33 PM, Alex Eckelberry 
al...@sunbelt-software.commailto:al...@sunbelt-software.com wrote:
The exe below is malware (I suppose everyone figured that out).


From: David McSpadden [mailto:dav...@imcu.commailto:dav...@imcu.com]
Sent: Tuesday, June 01, 2010 1:34 PM

To: NT System Admin Issues
Subject: What the heck?

Ok so my users are getting this right now.  I have blocked the ip with Ironport 
and sent the email saying not to open it but to delete it.
Anyone else getting this crap today?






If you already received this information before and action has been taken, then 
please ignore.

This important information about a security vulnerability requires your 
immediate attention!

All systems detected using Adobe products have been sent out this e-mail and 
are all requested to update their systems urgently.
Kindly follow the instructions in the e-mail as forwarded below.

Failure to comply will result in all financial and non financial loss to be a 
liability of the receiver.

Please treat this e-mail as a matter of urgency. No further follow up warning 
will be sent.

**This e-mail is a computer generated e-mail from 
ad...@imcu.commailto:ad...@imcu.com and does not require a reply**


--- On Fri, 5/28/10, Richard Barnett 
rbarn...@adobe.commailto:rbarn...@adobe.com wrote: ---
From: Richard Barnett rbarn...@adobe.commailto:rbarn...@adobe.com
To: Administrator ad...@imcu.commailto:ad...@imcu.com
Subject: Adobe Security Update
Date: Friday, May 28, 2010, 11:24 AM

Broadcast message:
Adobe has issued a directive which states that all systems running their 
software should be patched for the latest security glitch.
The CVE-2010-0193 Denial of Service Vulnerability has recently been discovered 
on several systems running the previously released version of the software, 
which has been further documented on security sites such as 
http://www.securityfocus.com/bid/39524
It is strongly advised that all systems running the Adobe software is updated 
with the latest security patch to avoid further situations hampering the 
security and integrity of the system. Failure to follow the directive would 
mean that any loss which occurs due to the negligence will be a liability of 
the company and not Adobe. The link to update the system with the latest patch 
and instructions are provided below:

Download the instructions here: http://190.144.101.204/adobe/update.pdf 
(requires Adobe Acrobat Reader).
To update your system, download the installation file here: 
http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).
(Read first the instructions before updating the system)


Your urgent attention is most appreciated,

Richard Barnett
Adobe Risk Management
345 Park Avenue
San Jose, CA 95110-2704
Tel: 408-587-3932
rbarn...@adobe.commailto:rbarn...@adobe.com

---
Disclaimer:
This e-mail message and information contained in or attached to this message is 
privileged, confidential, and protected from disclosure and is intended only 
for the person or entity to which it is addressed. Any review, re-transmission, 
dissemination, printing or other use of, or taking of any action in reliance 
upon this information by persons or entities other than the intended recipient 
is prohibited.

















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: What the heck?

2010-06-01 Thread Sean Martin
We've been seeing this today also.

- Sean

On Tue, Jun 1, 2010 at 9:34 AM, David McSpadden dav...@imcu.com wrote:

  Ok so my users are getting this right now.  I have blocked the ip with
 Ironport and sent the email saying not to open it but to delete it.

 Anyone else getting this crap today?













 If you already received this information before and action has been taken,
 then please ignore.



 This important information about a security vulnerability requires your
 immediate attention!



 All systems detected using Adobe products have been sent out this e-mail
 and are all requested to update their systems urgently.

 Kindly follow the instructions in the e-mail as forwarded below.



 Failure to comply will result in all financial and non financial loss to be
 a liability of the receiver.



 Please treat this e-mail as a matter of urgency. No further follow up
 warning will be sent.



 **This e-mail is a computer generated e-mail from ad...@imcu.com and does
 not require a reply**





 --- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---

 From: Richard Barnett rbarn...@adobe.com

 To: Administrator ad...@imcu.com

 Subject: Adobe Security Update

 Date: Friday, May 28, 2010, 11:24 AM



 Broadcast message:

 Adobe has issued a directive which states that all systems running their
 software should be patched for the latest security glitch.

 The CVE-2010-0193 Denial of Service Vulnerability has recently been
 discovered on several systems running the previously released version of the
 software, which has been further documented on security sites such as
 http://www.securityfocus.com/bid/39524

 It is strongly advised that all systems running the Adobe software is
 updated with the latest security patch to avoid further situations hampering
 the security and integrity of the system. Failure to follow the directive
 would mean that any loss which occurs due to the negligence will be a
 liability of the company and not Adobe. The link to update the system with
 the latest patch and instructions are provided below:



 Download the instructions here: 
 http://190.144.101.204/adobe/update.pdf(requires Adobe Acrobat Reader).

 To update your system, download the installation file here:
 http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).

 (Read first the instructions before updating the system)





 Your urgent attention is most appreciated,



 Richard Barnett

 Adobe Risk Management

 345 Park Avenue

 San Jose, CA 95110-2704

 Tel: 408-587-3932

 rbarn...@adobe.com



 ---

 Disclaimer:

 This e-mail message and information contained in or attached to this
 message is privileged, confidential, and protected from disclosure and is
 intended only for the person or entity to which it is addressed. Any review,
 re-transmission, dissemination, printing or other use of, or taking of any
 action in reliance upon this information by persons or entities other than
 the intended recipient is prohibited.













~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: [SPAM] Re: What the heck?

2010-06-01 Thread Simon Butler
Reminded me of this that I received over the weekend.
Looks like they are going after those who have heard all the reports about the 
problems with adobe PDF.

I have modified the URLs to make sure they aren't clickable.

Simon.




From: Adobe PDF Reader [mailto:supp...@adobe-pdf-solutions.org]
Sent: 29 May 2010 19:31
To: Simon Butler
Subject: Update New Adobe PDF Reader For Windows

Dear valued customers,

We are pleased to announce new release of Adobe PDF 2010 which will give you 
more options to view, create, edit, print and share PDF documents. You will not 
have to look around for help anymore !

+ 50% of your daily office works requires document handling.
+ 70% of your documents requires extra processing.
+ 15-20% of your documents requires exchanging with your peers, customers or 
partners.
+ 30% of such documents are in PDF format, and you need to view, edit, print 
and share them.

To learn more about new features and install Adobe PDF 2010, please:
+ Go to: http:// www.adobe-pdf-solutions. org/
+ Choose your options, download and start to improve your works.
A full version of Office suite is also available for your download.
DOWNLOAD TODAY: http:// www.adobe-pdf-solutions. org/
Best regards,
Adobe PDF 2010
--
Copy rights PDF Pro 2010 (c) All rights reserved
124 Denver St., Bluepoint, CA 91732, USA
Website: http://www.adobe-pdf-solutions.org/

From: Sean Martin [mailto:seanmarti...@gmail.com]
Sent: 01 June 2010 20:16
To: NT System Admin Issues
Subject: [SPAM] Re: What the heck?

We've been seeing this today also.

- Sean
On Tue, Jun 1, 2010 at 9:34 AM, David McSpadden 
dav...@imcu.commailto:dav...@imcu.com wrote:
Ok so my users are getting this right now.  I have blocked the ip with Ironport 
and sent the email saying not to open it but to delete it.
Anyone else getting this crap today?






If you already received this information before and action has been taken, then 
please ignore.

This important information about a security vulnerability requires your 
immediate attention!

All systems detected using Adobe products have been sent out this e-mail and 
are all requested to update their systems urgently.
Kindly follow the instructions in the e-mail as forwarded below.

Failure to comply will result in all financial and non financial loss to be a 
liability of the receiver.

Please treat this e-mail as a matter of urgency. No further follow up warning 
will be sent.

**This e-mail is a computer generated e-mail from 
ad...@imcu.commailto:ad...@imcu.com and does not require a reply**


--- On Fri, 5/28/10, Richard Barnett 
rbarn...@adobe.commailto:rbarn...@adobe.com wrote: ---
From: Richard Barnett rbarn...@adobe.commailto:rbarn...@adobe.com
To: Administrator ad...@imcu.commailto:ad...@imcu.com
Subject: Adobe Security Update
Date: Friday, May 28, 2010, 11:24 AM

Broadcast message:
Adobe has issued a directive which states that all systems running their 
software should be patched for the latest security glitch.
The CVE-2010-0193 Denial of Service Vulnerability has recently been discovered 
on several systems running the previously released version of the software, 
which has been further documented on security sites such as 
http://www.securityfocus.com/bid/39524
It is strongly advised that all systems running the Adobe software is updated 
with the latest security patch to avoid further situations hampering the 
security and integrity of the system. Failure to follow the directive would 
mean that any loss which occurs due to the negligence will be a liability of 
the company and not Adobe. The link to update the system with the latest patch 
and instructions are provided below:

Download the instructions here: http://190.144.101.204/adobe/update.pdf 
(requires Adobe Acrobat Reader).
To update your system, download the installation file here: 
http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).
(Read first the instructions before updating the system)


Your urgent attention is most appreciated,

Richard Barnett
Adobe Risk Management
345 Park Avenue
San Jose, CA 95110-2704
Tel: 408-587-3932
rbarn...@adobe.commailto:rbarn...@adobe.com

---
Disclaimer:
This e-mail message and information contained in or attached to this message is 
privileged, confidential, and protected from disclosure and is intended only 
for the person or entity to which it is addressed. Any review, re-transmission, 
dissemination, printing or other use of, or taking of any action in reliance 
upon this information by persons or entities other than the intended recipient 
is prohibited.













~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: [SPAM] Re: What the heck?

2010-06-01 Thread Don Guyer
Bad grammar is always a giveaway.

 

Don Guyer

Systems Engineer - Information Services

Prudential, Fox  Roach/Trident Group

431 W. Lancaster Avenue

Devon, PA 19333

Direct: (610) 993-3299

Fax: (610) 650-5306

don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com 

 

From: Simon Butler [mailto:si...@sembee.co.uk] 
Sent: Tuesday, June 01, 2010 3:33 PM
To: NT System Admin Issues
Subject: RE: [SPAM] Re: What the heck?

 

Reminded me of this that I received over the weekend. 

Looks like they are going after those who have heard all the reports
about the problems with adobe PDF. 

 

I have modified the URLs to make sure they aren't clickable. 

 

Simon. 

 

 

 

 

From: Adobe PDF Reader [mailto:supp...@adobe-pdf-solutions.org] 

Sent: 29 May 2010 19:31

To: Simon Butler

Subject: Update New Adobe PDF Reader For Windows

 

Dear valued customers,

 

We are pleased to announce new release of Adobe PDF 2010 which will give
you more options to view, create, edit, print and share PDF documents.
You will not have to look around for help anymore ! 

 

+ 50% of your daily office works requires document handling. 

+ 70% of your documents requires extra processing. 

+ 15-20% of your documents requires exchanging with your peers,
customers or partners. 

+ 30% of such documents are in PDF format, and you need to view, edit,
print and share them.  

 

To learn more about new features and install Adobe PDF 2010, please:

 

+ Go to: http:// www.adobe-pdf-solutions. org/

+ Choose your options, download and start to improve your works.

 

A full version of Office suite is also available for your download.

 

DOWNLOAD TODAY: http:// www.adobe-pdf-solutions. org/

 

Best regards,

 

Adobe PDF 2010

--

Copy rights PDF Pro 2010 (c) All rights reserved

124 Denver St., Bluepoint, CA 91732, USA

Website: http://www.adobe-pdf-solutions.org/

 

From: Sean Martin [mailto:seanmarti...@gmail.com] 
Sent: 01 June 2010 20:16
To: NT System Admin Issues
Subject: [SPAM] Re: What the heck?

 

We've been seeing this today also.

 

- Sean

On Tue, Jun 1, 2010 at 9:34 AM, David McSpadden dav...@imcu.com wrote:

Ok so my users are getting this right now.  I have blocked the ip with
Ironport and sent the email saying not to open it but to delete it.

Anyone else getting this crap today?

 

 

 

 

 

 

If you already received this information before and action has been
taken, then please ignore.

 

This important information about a security vulnerability requires your
immediate attention!

 

All systems detected using Adobe products have been sent out this e-mail
and are all requested to update their systems urgently.

Kindly follow the instructions in the e-mail as forwarded below.

 

Failure to comply will result in all financial and non financial loss to
be a liability of the receiver.

 

Please treat this e-mail as a matter of urgency. No further follow up
warning will be sent.

 

**This e-mail is a computer generated e-mail from ad...@imcu.com and
does not require a reply**

 

 

--- On Fri, 5/28/10, Richard Barnett rbarn...@adobe.com wrote: ---

From: Richard Barnett rbarn...@adobe.com

To: Administrator ad...@imcu.com

Subject: Adobe Security Update

Date: Friday, May 28, 2010, 11:24 AM

 

Broadcast message:

Adobe has issued a directive which states that all systems running their
software should be patched for the latest security glitch.

The CVE-2010-0193 Denial of Service Vulnerability has recently been
discovered on several systems running the previously released version of
the software, which has been further documented on security sites such
as http://www.securityfocus.com/bid/39524

It is strongly advised that all systems running the Adobe software is
updated with the latest security patch to avoid further situations
hampering the security and integrity of the system. Failure to follow
the directive would mean that any loss which occurs due to the
negligence will be a liability of the company and not Adobe. The link to
update the system with the latest patch and instructions are provided
below:

 

Download the instructions here: http://190.144.101.204/adobe/update.pdf
(requires Adobe Acrobat Reader).

To update your system, download the installation file here:
http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).

(Read first the instructions before updating the system)

 

 

Your urgent attention is most appreciated,

 

Richard Barnett

Adobe Risk Management

345 Park Avenue

San Jose, CA 95110-2704

Tel: 408-587-3932

rbarn...@adobe.com

 

---

Disclaimer: 

This e-mail message and information contained in or attached to this
message is privileged, confidential, and protected from disclosure and
is intended only for the person or entity to which it is addressed. Any
review, re-transmission, dissemination, printing or other use of, or
taking of any action in reliance upon this information by persons or
entities other than the intended recipient is prohibited