One of our users was sent this email today. It made it through our email filters,and the link came up clean on our webfilters, so I thought I would share.
From: LogMeIn.com Auto-Mailer [mailto:do-not-reply@logmein.com]
Sent: Monday, May 13, 2013 11:50 AM
To: *******
Subject: LogMeIn Notification - Software update required
Dear customer,
You are receiving this notification because you have chosen LogMeIn software as the remote control solution of your business.
We have been informed that a remote execution vulnerability exists in the LogMeIn software, allowing attackers to compromise a successfully exploited computer.
An emergency patch has been released, in order to reduce the potential successful attacks and fix this issue.
The patched computers will be secured against this type of attack.
The emergency patch can be downloaded from the following:
https::://secure.logmein.com/download.aspx?clusterid=04&trackinguniqueid=af45a28e-86d1-4834-8ad5-620b7cbff6f3&patch_id=04x73c73
(Actual url was pointing to http::://soest.........dk...../wp-admin/logmein_patch_04x73c73.zip)
Extra dots added to prevent accidental clicking. I didn't realize that logmein used a .dk domain :)
Safe browsing everyone.
It is strongly recommended that you apply this patch on all computers where LogMeIn is installed, as soon as possible.
If you are not on the computer where the software is installed, you can save the patch to a flash drive or to a CD, and then you can run it on the computer that has the problem.
Regards,
LogMeIn.com Support
(Please do not reply to this email, as it's sent from an address that's not monitored.)