Hi, Peter!
„Dear friend , use this Internet Explorer patch now! There are
dangerous virus in the Internet now! More than 500.000 already
infected!“
Dieser Text klingt auch absolut nicht wie ein von M$
verfasster Text. Es gab vor ein paar Monaten ein anderes
Virus, welches im Mailtext erheblich ‚echter‘ schien. Das hier
ist billig…
Okay! Habe besagten oder ähnlichen „professionelleren“ gerade in meinen
Spam-Verdachtsordner bekommen. –
Und so sieht er aus inklusive der exakten Zeilenumbrüche
(Wenn genau besagter es war) - bitte blättern -
Man beachte die letzte Zeile - das Attachment -
„installer.exe“ ist Fake!
Ich sage schon x
CU DannyFox64
„[email protected]“ und
„#[email protected]“ unkenntlich gemacht.
------- HEADER --------
From [email protected] Fri Sep 19 00:13:27 2003
Return-Path:
X-Flags: 1001
Delivered-To: GMX delivery to #[email protected]
X-Apparently-To: [email protected] via 66.163.169.89; Thu, 18 Sep 2003 12:49:49 -0700
X-YahooFilteredBulk: 139.7.30.104
Received: from pop.vip.sc5.yahoo.com [216.136.173.10]
by localhost with POP3 (fetchmail-6.2.4)
for #[email protected] (single-drop); Fri, 19 Sep 2003 02:13:27 +0200 (MEST)
Received: from 139.7.30.104 (EHLO SMTP-C.d2-net.de) (139.7.30.104)
by mta209.mail.scd.yahoo.com with SMTP; Thu, 18 Sep 2003 12:49:47 -0700
Received: from 217.111.67.142 ([217.111.67.142] helo=mhwbbebm) by SMTP-C.d2-net.de
authenticated as using SMTP-after-POP authentication
id SMTP-C.d2-net.de.3F6A0BC5.12844; Thu, 18 Sep 2003 19:47:17 +0000
FROM: "Technical Services"
TO: "Microsoft Corporation Partner"
SUBJECT: latest microsoft critical pack
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="vzscekuxazsv"
X-Collected-By: GMX/[email protected]
Date: Fri, 19 Sep 2003 02:13:27 +0200
Message-ID:
X-GMX-Antivirus: 1 (found virus W32/Gibe-F in Installer.exe)
------- MAIL --------
Microsoft Partner
this is the latest version of security update, the
„September 2003, Cumulative Patch“ update which eliminates
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express.
Install now to continue keeping your computer secure
from these vulnerabilities, the most serious of which could
allow an attacker to run executable on your computer.
This update includes the functionality of all previously released patches.
System requirements: Windows 95/98/Me/2000/NT/XP
This update applies to:
- MS Internet Explorer, version 4.01 and later
- MS Outlook, version 8.00 and later
- MS Outlook Express, version 4.01 and later
Recommendation: Customers should install the patch at the earliest opportunity.
How to install: Run attached file. Choose Yes on displayed dialog box.
How to use: You don’t need to do anything after installing this item.
Microsoft Product Support Services and Knowledge Base articles can be found on the Microsoft Technical Support web site.
http://support.microsoft.com/
For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site
http://www.microsoft.com/security/
Thank you for using Microsoft products.
Please do not reply to this message.
It was sent from an unmonitored e-mail address and we are unable to respond to any replies.
The names of the actual companies and products mentioned herein are the trademarks of their respective owners.
Copyright 2003 Microsoft Corporation.
Dateianhänge zur e-mail
Installer.exe
------- EOF --------