This links to a Microsoft support thread in which several users are reporting a suspicious update distributed through Windows Update. In lieu of a title and description, the update has 108-character and 24-character base52-encoded random numbers. In lieu of "more information" and "help and support" links, it has similarly random base52-encoded domains, which currently do not resolve, in .gov, .edu and .mil. Searching for the patch title turns up a bunch of people asking about the same suspicious patch on other sites, all within the past day. The update is attracting attention because it fails to install.<p><a href="http://security.stackexchange.com/questions/101520/weird-windows-update" rel="nofollow">http://security.stackexchange.com/questions/101520/weird-win...</a>
<a href="https://www.reddit.com/r/techsupport/comments/3mykv1/weird_windows_update/" rel="nofollow">https://www.reddit.com/r/techsupport/comments/3mykv1/weird_w...</a><p>This does strongly suggest a compromise of the Windows Update servers or of some bit of infrastructure that connects people to them, but also suggests that whoever the attackers are, they made a mistake - a successful compromise executed correctly would not leave so much evidence around. It's quite possible that they've been compromised for awhile, and this is a buggy update to the existing malware.