rs before the software giant issues genuine critical patches as part of its monthly Patch Tuesday cycle, according to security firm Sophos.
The emails, which have the subject line `Security Update for OS Microsoft Windows’ claims to have come from Steve Lipner at email@example.com.
The email tells unsuspecting computer users that the attached file is a high-priority update and needs to be installed by users of various versions of Microsoft Windows.
However, running the attached file infects Windows computer users with the Mal/EncPk-CZ Trojan horse, and could give hackers control over your PC. The file attached to the file is named KBxxxxxx.exe (where ‘xxxxxx’ is a randomly generated number) in order to disguise itself as a knowledgebase file.
Sophos is intercepting the malicious emails spammed out by the hackers, which read as follows:
Dear Microsoft Customer,
Please notice that Microsoft company has recently issued a Security Update for OS Microsoft Windows. The update applies to the following OS versions: Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows Millenium, Microsoft Windows XP, Microsoft Windows Vista.
Please notice, that present update applies to high-priority updates category. In order to help protect your computer against security threats and performance problems, we strongly recommend you to install this update.
Since public distribution of this Update through the official website http://www.microsoft.com would have result in efficient creation of a malicious software, we made a decision to issue an experimental private version of an update for all Microsoft Windows OS users.
As your computer is set to receive notifications when new updates are available, you have received this notice.
In order to start the update, please follow the step-by-step instruction:
1. Run the file that you have received along with this message.
2. Carefully follow all the instructions you see on the screen.
If nothing changes after you have run the file, probably in the settings of your OS you have an indication to run all the updates at a background routine. In that case, at this point the upgrade of your OS will be finished.
We apologise for any inconvenience this back order may be causing you.
Director of Security Assurance