Download presentation
Presentation is loading. Please wait.
Published byVanessa Allison Modified over 9 years ago
3
Report addresses data and trends observed over the past several years, but focuses on the first half of 2009 (1H09) Major sections include Malicious software and potentially unwanted software Email, spam and phishing threats Focus content on Malware and signed code Threat combinations Malicious Web sites Software vulnerability exploits Browser-based exploits Microsoft Office document exploits Drive-by download exploits Security and privacy breaches Software vulnerability disclosures Industry-wide vulnerability disclosures Microsoft Security Bulletins and the Exploitability Index Usage trends for Windows Update and Microsoft Update
5
Country/Region Computers Cleaned (1H09) Computers Cleaned (2H08) Change United States13,971,05613,245,7125.5% China2,799,4563,558,033-21.3% Brazil2,156,2591,654,29830.3% United Kingdom2,043,4312,225,016-8.2% Spain1,853,2341,544,62320.0% France1,703,2251,815,639-6.2% Korea1,619,1351,368,85718.3% Italy1,192,867978,87021.9% Turkey1,161,133768,93951.0% Germany1,086,4731,209,461-10.2% Mexico957,697915,6054.6% Canada942,826916,2632.9% Taiwan781,214466,92967.3% Russia581,601604,598-3.8% Japan553,417417,26932.6% The15 locations with the most computers cleaned by Microsoft desktop anti-malware products in 1H09
6
Significant differences in threat patterns worldwide Threat categories worldwide and in eight locations around the world, by incidence among all computers cleaned, 1H09
8
Location1H09 Finland1.9 Austria2.1 Puerto Rico2.1 Philippines2.3 Vietnam2.4 Macao S.A.R2.2 Tunisia2.5 Morocco2.6 Algeria2.8 Kenya2.9 Kazakhstan2.9 Germany3.0 Location1H09 Serbia and Montenegro97.2 Turkey32.2 Brazil25.4 Spain21.6 Korea21.3 Saudi Arabia20.8 Taiwan20.4 Guatemala17.0 Russia15.0 Mexico14.5 Thailand14.0 Egypt13.7 Locations with the lowest infection rates, by CCM, in 1H09 (100,000 monthly MSRT executions or more) Locations with the highest infection rates, by CCM, in 1H09 (100,000 monthly MSRT executions or more)
9
Miscellaneous trojans remain very prevalent Worm infections increased significantly Computers cleaned by threat category, in percentages, 2H06-1H09 Circular Markers Represent Malware Square Markers Represent Potentially Unwanted Software
10
Infection rates of Windows Vista SP1 were 61.9% less than Windows XP SP3 Windows Vista with no service pack were 85.3% less than Windows XP with no service pack installed Number of computers cleaned for every 1,000 MSRT executions, by operating system, 1H09
11
Computers cleaned by threat category, in percentages, 2H06-1H09 Relative OS infection rates remain consistent over time
12
Family Most Significant Category 1H092H08 1Win32/ConfickerWorms5,217,8623,719 2Win32/TaterfWorms4,911,8651,916,446 3Win32/RenosTrojan Downloaders & Droppers3,323,1984,371,508 4Win32/ZangoSearchAssistantAdware2,933,6273,326,275 5Win32/FrethogPassword Stealers & Monitoring Tools2,754,2261,037,451 6 Win32/FakeXPAMiscellaneous Trojans2,384,4971,691,393 7Win32/VundoMiscellaneous Trojans2,119,6063,635,207 8Win32/AlureonMiscellaneous Trojans1,976,735510,281 9Win32/ZangoShoppingReportsAdware1,412,4761,752,252 10Win32/AgentMiscellaneous Trojans1,361,6671,289,178 Top 15 malware and potentially unwanted software families detected by Microsoft anti- malware desktop products worldwide, by number of unique infected computers, in 1H09
13
User reaction to threat alerts varies widely by severity User reaction to alerts, by severity, 1H09
14
User action is more consistent for malware categories User action by threat category, 1H09
15
Category1H092H08Difference Viruses68,008,49662,785,3588.3% Miscellaneous Trojans23,474,53916,638,33341.1% Password Stealers & Monitoring Tools7,087,1411,287,106450.6% Trojan Downloaders & Droppers6,251,2865,511,40013.4% Adware3,402,2241,422,480139.2% Misc. Potentially Unwanted Software 2,753,0083,332,059-17.4% Worms2,707,5602,391,72213.2% Exploits1,311,250869,02350.9% Backdoors589,747631,520-6.6% Spyware269,556116,966130.5% Total115,854,80794,985,96722.0% Unique samples by category, 1H09 and 2H08
16
Graph excludes virus samples Viruses can infect many different files, each considered unique
17
Family Most Significant Category Total Samples Total Reports Reports/ Sample Win32/Parite Viruses 40,932,14166,786,6031.6 Win32/Virut Viruses 15,217,83931,000,1192.0 Win32/Agent Miscellaneous Trojans 6,720,42210,236,8761.5 Win32/Lolyda Password Stealers & Monitoring Tools 5,671,2518,293,7641.5 Win32/Vundo Miscellaneous Trojans 5,130,14327,959,3125.5 ASX/Wimad Trojan Downloaders & Droppers 3,339,29612,835,8003.8 Win32/Sality Viruses 3,154,3686,495,9552.1 Win32/Chir Viruses 3,100,2506,355,0732.0 Win32/GameVance Adware 2,785,39510,263,1133.7 Win32/Jeefo Viruses 2,589,94231,122,24112.0 Top 10 families with more than 1 million unique samples detected in 1H09
18
Enterprise computers were more likely to encounter worms Home computers were more likely to encounter trojans Threat categories detected by Windows Live OneCare and Forefront Client Security, by percentage of all infected computers cleaned by each program, 1H09
19
Windows Live OneCare Top Families Most Significant Category Percent ASX/WimadTrojan Downloaders & Droppers10.3% Win32/AgentMiscellaneous Trojans7.4% Win32/RenosMiscellaneous Trojans5.0% Win32/Obfuscator Misc. Potentially Unwanted Software 3.4% Win32/PdfjscExploits3.0% Win32/Xilos Viruses2.9% Win32/SwifTrojan Downloaders & Droppers2.3% Win32/AlureonMiscellaneous Trojans2.3% Win32/FakeXPAMiscellaneous Trojans2.2% Win32/AutorunWorms1.9% Top 10 families detected on infected computers by Windows Live OneCare, by percentage of computers cleaned, in1H09
20
Forefront Client Security Top Families Most Significant Category Percent Win32/ConfickerWorms12.3% Win32/AutorunWorms6.6% Win32/HamweqWorms5.9% Win32/AgentMiscellaneous Trojans5.1% Win32/TaterfWorms3.9% Win32/Obfuscator Misc. Potentially Unwanted Software 1.9% Win32/RenosMiscellaneous Trojans1.7% Win32/RealVNC Password Stealers & Monitoring Tools 1.6% Win32/SalityViruses1.6% Autolt/RenocideWorms1.4% Top 10 families detected on infected computers by Forefront Client Security, by percentage of computers cleaned, in1H09
21
Family Most Significant Category % of Signed Threat Files % of Signed Threat Reports Win32/Hotbar Adware 0.0%31.3% Win32/ZangoSearchAssistant Adware 0.0%23.4% Win32/ZangoShoppingReports Adware 0.0%17.1% Win32/Pointfree Misc. Potentially Unwanted Software 0.3%4.7% Win32/BaiduSobar Misc. Potentially Unwanted Software 0.0%3.7% Win32/Wintrim Miscellaneous Trojans 52.8%3.3% Win32/SeekmoSearchAssistant Adware 0.0%2.5% Win32/RealVNC Misc. Potentially Unwanted Software 0.0%1.9% Win32/GameVance Adware 29.7%1.9% Win32/WinFixer Misc. Potentially Unwanted Software 0.1%0.7% The 10 families responsible for the most signed-code threat reports in 1H09 Criminals sign malware code in efforts to evade detection Certificates may be issued to malware authors by CAs
22
Infected computers frequently have multiple infections Trojan threats were most likely to download other threats Threats that downloaded other threats, 1H09
23
Trojans also comprise a significant proportion of threats downloaded by other threats Threats that were downloaded by other threats, 1H09
24
Adware is a much larger proportion of single-country families Breakdown of threats hosted in one country and in multiple countries, by category, in 1H09
25
More than 97% of unwanted e-mail messages were blocked at the edge Percentage of incoming messages blocked by FOPE using edge-blocking and content filtering, 1H06-1H09
26
Spam was dominated by product advertisements in 1H09 Inbound messages blocked by FOPE content filters, by category, in 1H09
27
Most spam is sent through botnets or other automated tools The geographic origin of spam does not necessarily indicate the physical location of the spammer Geographic origins of spam, by percentage of total spam sent, in 1H09
28
Educational institutions are the source of most spam sent, despite accounting for a low portion of the FOPE customer base Computer management strategies may be less strict Outbound spam sent through FOPE, by type of organization, in 1H09
29
FOPE Families Most Significant Category Percent Win32/SmallTrojan Downloaders & Droppers39.1% Win32/VirutViruses10.3% Win32/ZbotPassword Stealers & Monitoring Tools8.5% Win32/Delfinject Miscellaneous Potentially Unwanted Software 4.3% Win32/ProvisMiscellaneous Trojans3.4% Win32/VB Miscellaneous Trojans3.1% Win32/ProlacoWorms2.9% Win32/NetskyWorms2.6% Win32/MydoomWorms2.3% Win32/AutorunWorms2.1% Top 10 families detected in e-mail by Forefront Online Protection for Exchange, by percentage of all infected messages, in1H09
30
Windows Live Hotmail Families Most Significant Category Percent JS/RedirectorMiscellaneous Trojans10.4% Win32/NetskyWorms8.1% Win32/MabezatVirus4.7% Win32/HelpudMiscellaneous Trojans3.9% Win32/RochapTrojan Downloaders & Droppers3.5% Win32/Agent Miscellaneous Trojans2.6% Win32/GamaniaPassword Stealers & Monitoring Tools2.3% ASX/WimadTrojan Downloaders & Droppers2.2% Win32/MydoomWorms2.2% Win32/MywifeWorms2.1% Top 10 families detected in e-mail by Windows Live Hotmail, by percentage of all infected messages, in1H09
31
Family Most Significant Category Desktop & Mobile Client Percent Web Client Percent Total Percent JS/RedirectorMiscellaneous Trojans15.3%1.1%10.4% Win32/NetskyWorms10.8%3.0%8.1% Win32/MabezatVirus6.7%0.9%4.7% Win32/HelpudMiscellaneous Trojans3.2%5.3%3.9% Win32/RochapTrojan Downloaders & Droppers1.3%7.7%3.5% Win32/Agent Miscellaneous Trojans1.6%4.6%2.6% Win32/Gamania Password Stealers & Monitoring Tools 3.5%0.1%2.3% ASX/WimadTrojan Downloaders & Droppers1.7%3.2%2.2% Win32/MydoomWorms1.9%2.9%2.2% Win32/MywifeWorms1.9%2.5%2.1% Top 10 malware families detected by Windows Live Hotmail, by method of access, in1H09
32
Phishing impressions suddenly increased in May and June 2009 Phishing impressions tracked each month in 2H08 and 1H09, indexed to January 2009
33
The number of phishing sites did not increase to the same extent Active phishing sites tracked each month in 2H08 and 1H09, indexed to January 2009
34
The significant increase in phishing impressions seems to have been driven by one or more campaigns targeting social networks Impressions for each type of phishing site each month in 1H09
35
A small number of sites account for the bulk of social network phishes Active phishing sites tracked each month in 2H08 and 1H09, indexed to January 2009
38
RankFamily Most Significant Category Percent of Malware Impressions 1Win32/MoneytreeMisc. Potentially Unwanted Software32.8% 2Win32/PdfjscExploits5.2% 3Win32/RenosTrojan Downloaders & Droppers4.6% 4Win32/FakeXPAMiscellaneous Trojans4.6% 5Win32/WinwebsecMiscellaneous Trojans4.5% 6Win32/PrivacyCenter Miscellaneous Trojans4.2% 7Win32/ObfuscatorMiscellaneous Trojans4.0% 8Win32/InternetAntivirusMiscellaneous Trojans4.0% 9Win32/SmallTrojan Downloaders & Droppers3.7% 10Win32/FakereanMiscellaneous Trojans3.3% Top 10 malware families hosted on sites blocked by the SmartScreen filter in Internet Explorer in 1H09
39
Potentially unwanted software phishing impressions increased while detections diminished on the desktop SmartScreen may be having a measurable amount of success in preventing these threats reaching the desktop Threats hosted at URLs blocked by the SmartScreen filter, by category, in 2H08 and 1H09
43
Data taken from user-reported incidents, submissions of malicious code, and Windows error reports Data from multiple operating systems and browsers Browser-based exploits, by percentage, encountered in 1H09
44
The 10 browser-based vulnerabilities exploited most often, by month, January-June 2009
45
The most common system locale was China (China), at 53.6% of all incidents The second most common was United States (English), at 27.5% Browser-based exploits, by system locale, encountered in 1H08
46
On Windows XP-based machines, Microsoft vulnerabilities account for 56.4% of the exploits On Windows Vista-based machines, Microsoft vulnerabilities account for only 15.5% of the exploits Browser-based exploits targeting Microsoft and third-party software on computers running Windows XP in1H09 Browser-based exploits targeting Microsoft and third-party software on computers running Windows Vista in 1H09
47
On Windows XP-based machines Microsoft software accounted for 6 of the top 10 vulnerabilities The most commonly exploited vulnerability was disclosed and patched by Microsoft in 2006 The 10 browser-based vulnerabilities exploited most often on computers running Windows XP, by percentage of all exploits in 1H09
48
On Windows Vista-based machines Microsoft software accounted for only one of the top 10 vulnerabilities The 10 browser-based vulnerabilities exploited most often on computers running Windows Vista, by percentage of all exploits in1H09
49
Trojan downloaders & droppers are well suited to drive- by download attacks as they can then download additional threats Types of threat payloads delivered through drive-by downloads in 1H09
51
Percentile distribution of exploit servers by the number of drive-by pages pointing to each one, 1H09
52
Drive-by download pages pointing to exploit servers marutz.cn and 3b3.org during May 2009
53
Drive-by download exploit servers are concentrated in a small number of Top Level Domains These Top Level Domains are prevalent in heavily- populated countries Types of malware dropped during Microsoft Office exploit attacks
54
BulletinDateVulnerabilityCVE MS06-027June 2006Word Malformed Pointer Object VulnerabilityCVE-2006-2492 MS06-028June 2006 PowerPoint Remote Code Execution using a Malformed Record Vulnerability CVE-2006-0022 MS06-037July 2006Excel File Rebuilding OverflowCVE-2006-2388 MS06-048August 2006PowerPoint mso.dll VulnerabilityCVE-2006-3590 MS06-060October 2006Word Mail Merge VulnerabilityCVE-2006-3651 MS07-014February 2007 Word Malformed Data Structures Vulnerability CVE-2006-6456 MS07-015February 2007Excel Malformed Record VulnerabilityCVE-2007-0671 MS07-025May 2007Drawing Object VulnerabilityCVE-2007-1747 MS08-014March 2008Macro Validation VulnerabilityCVE-2008-0081 MS09-009April 2009Excel Memory Corruption VulnerabilityCVE-2009-0238 MS09-017May 2009PowerPoint Memory Corruption VulnerabilityCVE-2009-0556 Vulnerabilities exploited in Microsoft Office file formats
55
Data from submissions of malicious code to Microsoft One vulnerability was the target of 71.0% of all attacks Microsoft Office file format exploits, by percentage, encountered in 1H09
56
The most common locales correspond to countries and regions with large populations Microsoft Office file format exploits, by percentage, encountered in 1H09
57
Microsoft Office file format exploits encountered, by date of last Windows or Office security update, in 1H09
58
VulnerabilityBulletin Office 2000 RTM Office XP RTM Office 2003 RTM Office 2007 RTM CVE-2006-0022MS06-028Yes No CVE-2006-2388MS06-037Yes No CVE-2006-2492MS06-027Yes No CVE-2006-3590MS06-048Yes No CVE-2006-3651MS06-060Yes No CVE-2006-6456 MS07-014 Yes No CVE-2007-0671MS07-015Yes No CVE-2007-1747MS07-025Yes CVE-2008-0081MS08-014Yes CVE-2009-0238MS09-009Yes CVE-2009-0556MS09-017Yes Vulnerabilities affecting RTM versions of Office 2000-2007
59
VulnerabilityBulletin Office 2000 RTM Office XP RTM Office 2003 RTM Office 2007 RTM CVE-2006-0022MS06-028Yes No CVE-2006-2388MS06-037Yes No CVE-2006-2492MS06-027Yes No CVE-2006-3590MS06-048Yes No CVE-2006-3651MS06-060Yes No CVE-2006-6456 MS07-014 Yes No CVE-2007-0671MS07-015Yes No CVE-2007-1747MS07-025Yes No CVE-2008-0081MS08-014Yes No CVE-2009-0238MS09-009Yes No CVE-2009-0556MS09-017Yes Vulnerabilities affecting Office 2000-2007 with latest service packs installed
60
Types of malware dropped during Microsoft Office exploit attacks Nearly 90% of exploits involved a trojan or backdoor These threats allow access to install more malware
61
Family Most Significant Category Percent of trojans Win32/BuzusTrojan Downloaders & Droppers29.5% Win32/AgentBypassMiscellaneous Trojans11.7% Win32/EnfalMiscellaneous Trojans11.3% Win32/SmallMiscellaneous Trojans6.4% Win32/SystemHijackMiscellaneous Trojans3.0% Win32/ProcInject Miscellaneous Trojans 3.0% Win32/MalresTrojan Downloaders & Droppers2.6% Win32/KirpichTrojan Downloaders & Droppers2.3% Win32/MalagentMiscellaneous Trojans2.3% Win32/BumatMiscellaneous Trojans2.3% Top 10 trojan families used in Office exploits in 1H09
62
Family Most Significant Category Percent of trojans Win32/PoisonIvyBackdoors61.4% Win32/BifroseBackdoors7.4% Win32/RipnipBackdoors5.5% Win32/DifeqsBackdoors4.1% Win32/RilerBackdoors3.9% Win32/Farfil Backdoors 2.8% Win32/DelfBackdoors2.5% Win32/PcClientBackdoors2.3% Win32/VedenBackdoors2.3% Win32/AgentBackdoors1.8% Top 10 backdoor families used in Office exploits in 1H09
64
Hacking and viruses less than 25 percent of all notifications in 1H09 Most breaches resulted from stolen, lost or improperly disposed of equipment Security breach incidents, by incident type, 2H07 – 1H09
66
Disclosures in 1H09 down 28.4% from 2H08 1H09 had the lowest number of disclosures since 2H05 Industry-wide vulnerability disclosures by half-year, 1H04-1H09
67
Disclosure of high severity vulnerabilities down 12.9% The highest severity rating accounts for 6.7% of all disclosures Industry-wide vulnerability disclosures by severity, 1H09 Industry-wide vulnerability disclosures by severity by half-year, 2004–2009 Low Medium High
68
Proportion of Low complexity disclosures declined… …but majority of disclosures still remain Low complexity Industry-wide vulnerability disclosures by access complexity, 1H04–1H09
69
High severity vulnerabilities, by access complexity, in 1H09 69.7 percent of High severity vulnerabilities were also classified as Low complexity
70
Application vulnerabilities down sharply in 1H09 OS and browser vulnerabilities relatively stable Operating system, browser & application vulnerabilities as a percentage of all disclosures, 1H04-1H09
71
Microsoft vulnerability disclosures mirror the industry totals, though on a much smaller scale Vulnerability disclosures for Microsoft and non-Microsoft products, 1H04-1H09 Non-Microsoft Microsoft
72
Responsible disclosure rates rose to a high of 79.5% Responsible disclosures as a percentage of all disclosures involving Microsoft software, 1H05-1H09
73
In 1H09 Microsoft released 27 bulletins addressing 87 individual CVE-identified vulnerabilities Security bulletins released and CVEs addressed by half-year, 1H05-1H09
74
Microsoft continues to combine vulnerabilities into single updates, thus reducing the number of patching events Average number of CVEs addressed per security bulletin, 1H05-1H09
75
The Exploitability Index has helped IT professionals prioritized deployment of security updates CVEs with exploits discovered within 30 days, by Exploitability Index rating, in 1H09
76
Workaround and mitigation status for 1H09 security bulletins Microsoft gives workaround, mitigation or attack surface reduction advice where possible
77
Adoption of Microsoft Update has risen significantly Microsoft Update provides a more comprehensive solution than Windows Update alone Usage of Windows Update and Microsoft Update, 2H06-1H09, indexed to 2H06 total usage
78
Both WSUS and end-user update services are growing faster than the Windows installed base Users are choosing to enable updating on new and existing Windows installations Relative growth in Microsoft WSUS and end-user update services, 2H06-1H09, indexed to 2H06
79
Daily Windows error reports caused by Win32/Renos on Windows Vista computers in February and March 2007 A Windows Defender signature issued via Microsoft Update had a significant and dramatic impact on Win32/Renos trojan infections
80
Update service usage and software piracy rates for seven locations worldwide, relative to the United States Usage of Microsoft updates varies worldwide Variations are due to a variety of factors including broadband Internet connectivity, software piracy and the percentage of computers in enterprise environments
81
MythFact Anti-piracy updates are forcibly installed by Microsoft if users install updates through Windows Update and Automatic Updates Users can, through the Windows Update or Automatic Updates control panels, choose how updates are downloaded and installed. Use of the Windows Update and Microsoft Update Web sites (Windows XP and Windows Server 2003) is gated to require Genuine validation, but there is no restriction on the use of Automatic Updates on the local computer. Microsoft does not offer security updates to pirated systems. Microsoft offers all security updates for Windows and all other Microsoft products. They also allow all computers to install the latest service packs, update rollups, critical reliability updates, compatibility updates, and most software upgrades. Microsoft update services scan computers for pirated software and relay personally identifiable information (PII) back to Microsoft for use in criminal prosecutions. Microsoft’s update services do not collect and forward personally identifiable information back to Microsoft for use in criminal prosecutions. To help mitigate privacy concerns, Microsoft has obtained and continues to renew third-party privacy certification for each version of the Windows update client. For more information about how privacy is protected through Windows Update, refer to the Windows Update privacy statement. For more information on how privacy is protected through genuine software updates, refer to the Microsoft Genuine Advantage Privacy Statement. Microsoft update services will cause non-genuine computers to crash more often or experience performance problems. Functionality of Windows is reduced on non- genuine computers. The functionality, reliability, or performance of non-genuine Windows based computers is not degraded. The following things will occur for a non-genuine computer: The desktop background will be changed to the color black. The user will be periodically notified that the computer is non-genuine. The user may not be offered new software or less-critical (value added) updates that are offered to Genuine Windows-based computers.
82
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.