Hackers spam fake Microsoft security update
A clever attempt to take advantage of Microsoft’s ‘Patch Tuesday’.
Hackers are taking advantage of Patch Tuesday with a malicious Trojan email disguised as a Microsoft security update.
The email claims to come from Steve Lipnser at the address securityassurance@microsoft.com with the subject line "Security Update for OS Microsoft Windows." It asks you to run the file attached with the message and appears to coincide with Microsoft's genuine monthly patch cycle.
Microsoft never sends out security updates as email attachments, but the email tries to explain this by claiming it is "an experimental private version."
Graham Cluley, senior technology consultant at Sophos, said that running the attached file would infect Windows computer users with the Mal/EncPK-CZ Trojan horse and give hackers control of the PC.
He advised users: "They should always visit the genuine Microsoft website or use automatic updating processes to keep their systems current."
The fake update comes after Microsoft gave advanced notice of its monthly patch cycle for the first time.
A picture of the fake update is here.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
OpenAI's 'Skills in Codex' service aims to supercharge agent efficiency for developersNews The Skills in Codex service will provide users with a package of handy instructions and scripts to tweak and fine-tune agents for specific tasks.
-
Cloud infrastructure spending hit $102.6 billion in Q3 2025News Hyperscalers are increasingly offering platform-level capabilities that support multi-model deployment and the reliable operation of AI agents
-
CronRat Magecart malware uses 31st February date to remain undetectedNews The malware allows for server-side payment skimming that bypasses browser security
-
Mekotio trojan continues to spread despite its operators’ arrestsNews Hackers have used it in 100 more attacks since arrests
-
“Trojan Source” hides flaws in source code from humansNews Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
-
What is Emotet?In-depth A deep dive into one of the most infamous and prolific strains of malware
-
Fake AnyDesk Google ads deliver malwareNews Malware pushed through Google search results
-
Hackers use open source Microsoft dev platform to deliver trojansNews Microsoft's Build Engine is being used to deploy Remcos password-stealing malware
-
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark webNews The source code for the authenticator-breaking malware is available for free on underground forums
-
Qbot malware surges into the top-ten most common business threatsNews An evolved form of the banking Trojan was distributed by number one-ranking Emotet in a campaign that hit 5% of businesses globally