相继收到有这样标题与附件的邮件:
标题:为人父母,我们应扮演哪种角色,附件:寻找我们的角色.doc
标题:阿沛.晋美谈西藏问题国际化, 附件:访谈录1--西藏问题之国际化.doc
其都含义一个较新的病毒,"MS Office Exploit RTF MSCOMCTL.OCX RCE CVE-
2012-0158",很多杀毒软件暂时都还测不出。请留意。
基本原则:没有百分之百的把握,不要打开任何附件。此外,给别人发信时,凡是
可以不用附件形式发的文字,也请直接放在邮件正文里,尽量不要发附 件。
小刚
On 2013/1/16 11:15, malware@vicheck.ca wrote:
> Thank you for your submission to vicheck.ca.
>
>
> We received your message:
> From: "Xiaogang Zhang (G)" <xiaogangz@acm.org>
> Subject: Fwd: 阿沛.晋美谈西藏问题国际化
> Date: Wed, 16 Jan 2013 10:38:03 +1100
> Message-ID: <50F5E85B.40307@acm.org>
>
> 访谈录1--西藏问题之国际化.doc:
> SCAN: Suspicious file - MS Office Exploit RTF MSCOMCTL.OCX RCE CVE-2012-0158
> REPORT: https://www.vicheck.com/md5query.php?hash=5a8f4df978d002f8b1a3fe5d3fa4fce2
> Exploit method detected: genexploit - MS Office Exploit RTF MSCOMCTL.OCX RCE CVE-2012-0158.
> Confidence ranking: 50 (1 hits).
>
> External hash searches:
> VIRUS SCAN VirusTotal: New
> VIRUS SCAN Threat Expert: New
> VIRUS SCAN Team-CYMRU.org: New
>
>
> This email was sent automatically in response to your email to hereyougo@vicheck.ca submitting a suspected virus to us. You can also upload suspicious files on www.vicheck.ca
>
> Disclaimer: While many embedded executables are detected by our scan, as with any anti-virus there is no guarantee that all viruses are detected or that new exploits that download malware directly from the internet are detected. Remember not to open web links or email attachments that you were not expecting or can't verify their legitimacy with the sender.
>
>
--
★★《权利》电子邮件网络非常鼓励具有行动力的文章供大家分享和引起支持!
1,所有帖子没有注明"不可转载"的,一律可以转载;转发本邮件成员文章,请注明:转自《权利》http://groups.google.com/group/ChinaRights
2,《权利》公共发言,请发电子邮件到 ChinaRights@googlegroups.com
3,订阅,请发邮件到 chinarights-subscribe@googlegroups.com
4,要退订此论坛,请发邮件至 ChinaRights-unsubscribe@googlegroups.com
5,群发邮件,慎重发言,文明用语,切忌只言片语不明不确!
6,备份查询:http://chinarights2.blogspot.com
没有评论:
发表评论