Mass-mail from Microsoft re Blaster worm?

From: Alex Lambert (alambertat_private)
Date: Fri Aug 15 2003 - 14:50:29 PDT

  • Next message: Dan Hubbard: "msblast and RFC 1918 addresses"

    Has anyone else received a message from the domain 
    "newsletters.microsoft.com" regarding Blaster? Is anyone else having SSL 
    warnings pop up after trying the verify link?
    
    It looks legitimate, but the link that they included to "prove" its 
    authenticity appears to have some problems with Akamaization, giving an 
    SSL warning in Mozilla. A rather humorous screenshot of such is 
    available at http://bender.quickfire.org/msoops.png
    
    I've pasted a copy below.
    
    
    Alex Lambert
    
    
    
    -------- Original Message --------
    Subject: 	IMPORTANT SECURITY ANNOUNCEMENT - for Windows Users re: 
    Blaster Worm
    Date: 	Fri, 15 Aug 2003 14:10:03 -0700
    From: 	Microsoft <long sting removedat_private>
    Reply-To: 	<another long stringat_private>
    To: 	<my address>
    
    
    
    This e-mail message is being sent to you by Microsoft Corporation. To verify the authenticity of this e-mail message, please visit: http://go.microsoft.com/?linkid=221444 
    
    
    Dear Microsoft Customer,
    
    On August 11, 2003, Microsoft began investigating a report of a worm, known as W32.Blaster.Worm, that exploits the vulnerability addressed by Microsoft Security Bulletin MS03-026. Microsoft released this critical security bulletin and corresponding patch for Windows operating systems on July 16, 2003. While some customers may not notice the presence of the worm infection at all on their computer systems, typical symptoms may include Windows XP and Windows Server 2003 systems rebooting every few minutes without user input or Windows NT4 and Windows 2000 systems becoming unresponsive.
    
    If you applied security patch MS03-026 prior to the discovery of the Blaster worm, your system is secure from the vulnerability that W32.Blaster is using. For the most current information on determining if your systems are infected and how to recover from the infection, please go to the following Web site and perform the prescribed steps: http://go.microsoft.com/?linkid=221445. This site will be updated as more information regarding the W32.blaster worm becomes available. 
     
    Our goal is to provide you with the information and tools you need to help run your company safely and reliably. When we become aware of these types of vulnerabilities, it is our goal to share protection and remediation information with you as quickly as is possible. In order to help protect your computing environment from security vulnerabilities, we encourage you to use the Windows Update service by going to http://go.microsoft.com/?linkid=221446 and also subscribe to Microsoft's security notification service at http://go.microsoft.com/?linkid=221447. By using these two services you will automatically receive information on the latest software updates and the latest security notifications, thereby improving the likelihood that your computing environment will be safe from the worms and viruses that occur.
     
    Thank you,
    
    Microsoft Corporation
    
    For information about Microsoft's privacy policies, please go to http://go.microsoft.com/?linkid=221443
    
    
    
    
    ---------------------------------------------------------------------------
    Captus Networks - Integrated Intrusion Prevention and Traffic Shaping  
     - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans
     - Automatically Control P2P, IM and Spam Traffic
     - Ensure Reliable Performance of Mission Critical Applications
     - Precisely Define and Implement Network Security and Performance Policies
    **FREE Vulnerability Assessment Toolkit - WhitePapers - Live Demo
    Visit us at: 
    http://www.securityfocus.com/sponsor/CaptusNetworks_incidents_030814
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Fri Aug 15 2003 - 18:05:08 PDT