{"id":66,"date":"2008-05-22T21:22:40","date_gmt":"2008-05-22T21:22:40","guid":{"rendered":"https:\/\/blogs.swarthmore.edu\/its\/?p=66"},"modified":"2008-05-22T21:22:40","modified_gmt":"2008-05-22T21:22:40","slug":"microsoft-security-update-spam-in-circulation","status":"publish","type":"post","link":"https:\/\/blogs.swarthmore.edu\/its\/2008\/05\/22\/microsoft-security-update-spam-in-circulation\/","title":{"rendered":"Microsoft Security Update Spam in Circulation"},"content":{"rendered":"<p class=\"MsoNormal\"><strong>DO NOT<\/strong> open any email claiming to be a Security Update from Microsoft.<span> <\/span>Email users in the Swarthmore community are reporting that email pretending to be from microsoft.com is currently in circulation.<span> <\/span>The subject of the email claims that it contains information about an important security update.<span> <\/span>Below is one example of the subject line being reported (other variations may exist):<\/p>\n<pre>Important update from Microsoft Windows XP\/2003 Professional\nService Pack 2 (KB946026)<\/pre>\n<p class=\"MsoNormal\">The file associated with these emails has been confirmed as malware and initially looks like it could be used for \u201c<a title=\"Keylogging\" href=\"http:\/\/en.wikipedia.org\/wiki\/Keystroke_logging\" target=\"_blank\">keylogging<\/a>\u201d (i.e., keeping track of every key a user presses in order to steal passwords, credit card numbers, etc.) and remotely taking over your PC.<\/p>\n<p class=\"MsoNormal\">\n<p class=\"MsoNormal\">How would I know this Microsoft email isn\u2019t genuine?<\/p>\n<p class=\"MsoNormal\" style=\"margin-left: 0.5in; text-indent: -0.25in;\"><!--[if !supportLists]--><span>&#8211;<span style=\"font-family: \"> <\/span><\/span><!--[endif]-->misspellings in the email (including Microsoft!)<\/p>\n<p class=\"MsoNormal\" style=\"margin-left: 0.5in; text-indent: -0.25in;\"><!--[if !supportLists]--><span>&#8211;<span style=\"font-family: \"> <\/span><\/span><!--[endif]-->Microsoft will NEVER email you links to a security update download or an attachment to run<\/p>\n<p class=\"MsoNormal\" style=\"margin-left: 0.5in; text-indent: -0.25in;\"><!--[if !supportLists]--><span>&#8211;<span style=\"font-family: \"> <\/span><\/span><!--[endif]-->at Swarthmore, Windows PC\u2019s download security updates automatically from a local, ITS managed server<\/p>\n<p class=\"MsoNormal\" style=\"margin-left: 0.5in; text-indent: -0.25in;\"><!--[if !supportLists]--><span>&#8211;<span style=\"font-family: \"> <\/span><\/span><!--[endif]-->viewing the email in textual format shows that the download URL doesn\u2019t link to microsoft.com<\/p>\n<p class=\"MsoNormal\">As a reminder, you should <strong>never <\/strong>download a file that you weren\u2019t already expecting nor open an email from someone you don\u2019t know.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DO NOT open any email claiming to be a Security Update from Microsoft. Email users in the Swarthmore community are reporting that email pretending to be from microsoft.com is currently in circulation. The subject of the email claims that it contains information about an important security update. Below is one example of the subject line being reported (other variations may exist): Important update from Microsoft Windows XP\/2003 Professional Service Pack 2 (KB946026) The file associated with these emails has been confirmed as malware and initially looks like it could be used for \u201ckeylogging\u201d (i.e., keeping track of every key a &hellip; <a href=\"https:\/\/blogs.swarthmore.edu\/its\/2008\/05\/22\/microsoft-security-update-spam-in-circulation\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Microsoft Security Update Spam in Circulation<\/span><\/a><\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[112,113,96],"tags":[],"class_list":["post-66","post","type-post","status-publish","format-standard","hentry","category-email","category-facultystaff","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph2nPL-14","_links":{"self":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/posts\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":0,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/posts\/66\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/media?parent=66"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/categories?post=66"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/tags?post=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}