Websense Security Labs said in a blog post that the emails are designed to imitate a Twitter Password Reset Notification message. The spam contains a link to a compromised web site that, when clicked on or pasted into the browser, prompts the user to download a malicious executable named 'password.exe'.
The spam contains a link to a compromised Web site that, when clicked or pasted into the browser, prompts the user to download a malicious executable named password.exe. The executable turns out to be a rogue AV called Protection Center Safebrowser. What distinguishes this rogue AV from the others is that it actually displays on the user's desktop some of the malicious files it installs. This makes the attack notification more believable.