Security Intelligence Report Volume 22
Security Intelligence Report Volume 22
Security Intelligence Report Volume 22
Intelligence Report
Volume 22 | January through March, 2017
This document is for informational purposes only. MICROSOFT MAKES NO
WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION
IN THIS DOCUMENT.
The names of actual companies and products mentioned herein may be the
trademarks of their respective owners.
Authors
Eric Avena Volv Grebennikov Carmen Liang
Windows Defender Research Bing Windows Defender Research
Team Team
Vidya Gururaja Rao
Roger Capriotti Windows Active Defense Data Ryan McGee
Microsoft Edge Product Engineering and Analytics Cloud and Enterprise
Marketing team Marketing
Chris Hallum
Zheng Dong Windows Active Defense Matt Miller
Windows Defender ATP Product Marketing team Windows Active Defense
Research
Paul Henry Chad Mills
Eric Douglas Wadeware LLC Windows Defender ATP
Windows Defender Research Research
Susan Higgs
Team
Windows Defender ATP Phillip Misner
Matt Duncan Research Security Research
Windows Active Defense
Michael Johnson Abdul Mohammed
Matthew Duncan Windows Defender Research Windows Defender Research
Windows Active Defense Data Team Team
Engineering and Analytics
Kasia Kaplinska Hamish O'Dea
Sarah Fender Cloud and Enterprise Windows Defender Research
Azure Security Marketing Team
ii FOREWORD
Authors (continued)
Mark Simos Tomer Teller Erik Wahlstrom
Enterprise Cybersecurity Azure Security Windows Defender Research
Group Team
Sandhya Venkatraman
Holly Stewart Windows Active Defense Data Alex Weinert
Windows Defender Research Engineering and Analytics Identity Security and
Team Protection Team
Maria Vlachopoulou
Elda Tan Seng Security Research Jason Yim
Windows Defender Research Windows Active Defense Data
Team Engineering and Analytics
Contributors
Iaan D'Souza- Wiltshire Dolcita Montemayor Daniel Simpson
Content Publishing Team Content Publishing Team Content Publishing Team
Appendixes 41
Appendix A: Threat naming conventions .......................................................................... 43
Appendix B: Data sources ........................................................................................................ 45
Appendix C: Worldwide encounter rates ........................................................................... 48
Glossary ......................................................................................................................................... 52
Threat families referenced in this report .............................................................................57
Index ............................................................................................................................................... 61
iv FOREWORD
Foreword
Welcome to the 22nd edition of the Microsoft Security Intelligence Report, a bi-
annual publication that we create for our customers, partners, and the industry.
The purpose of this report is to educate organizations about the current state of
threats, recommended best practices, and solutions. What sets it apart from
other security reports is the tremendous breadth and depth of intelligence it
draws from.
The intelligence that informs this report comes from security-related signals
from the consumer and commercial on-premises systems and cloud services
that Microsoft operates on a global scale. For example, every month we scan
400 billion emails for phishing and malware, process 450 billion authentications,
and execute 18+ billion webpage scans.
In this edition of the report, we’ve made two significant changes: First, we have
organized the data sets into two categories, cloud and endpoint, because we
believe it is important to provide visibility across both. Second, we are sharing
data about a shorter time period, one quarter (January 2017 – March 2017),
instead of six months. We plan to share data on a more regular basis moving
forward, so that you can have more timely visibility into the threat landscape.
This increase in frequency is rooted in a principle that guides Microsoft
technology investments as well: using data and intelligence to help our
customers respond to threats faster.
We hope that readers find the data, insights, and guidance provided in this
report useful in helping them protect their organizations, software, and users.
Microsoft Security
Reporting period
This volume of the Microsoft Security Intelligence Report focuses on the first
quarter of 2017, with trend data presented on a monthly basis. Throughout the
report, half-yearly and quarterly time periods are referenced using the nHyy or
nQyy formats, in which yy indicates the calendar year and n indicates the half or
quarter. For example, 1H17 represents the first half of 2017 (January 1 through
June 30), and 4Q16 represents the fourth quarter of 2016 (October 1 through
December 31). To avoid confusion, please note the reporting period or periods
being referenced when considering the statistics in this report.
Conventions
This report uses the Windows Defender Security Intelligence (WDSI; formerly
called the Microsoft Malware Protection Center, or MMPC) naming standard for
families and variants of malware. For information about this standard, see
“Appendix A: Threat naming conventions” on page 43. In this report, any threat
or group of threats that share a common unique base name is considered a
family for the sake of presentation. This consideration includes threats that may
not otherwise be considered families according to common industry practices,
such as generic and cloud-based detections. For the purposes of this report, a
threat is defined as a malicious or unwanted software family or variant that is
detected by the Microsoft Malware Protection Engine.
450%
400%
350%
Percent of 1Q16 monthly average
300%
250%
2016
200% 2017
150%
100%
50%
0%
January February March
1Microsoft requires users to choose strong passwords that can’t be easily guessed for consumer Microsoft
accounts, and recommends that organizations adopt similar policies for their identity management systems.
180%
160%
140%
Percent of 1Q16 monthly average
120%
100%
2016
80% 2017
60%
40%
20%
0%
January February March
Microsoft automated systems detect and block millions of password attacks each
day. When an attacker is observed using a valid credential, the request is
challenged and the user is required to provide additional validation in order to
sign in. Attackers, for their part, can be sophisticated and skilled at mimicking real
users, making the task of safeguarding accounts a constantly evolving challenge.
Spam
19.0%
Port scanning/port
RDP brute force sweeping
23.0% 3.7%
Communication
with malicious IP
51.0%
Figure 4 and Figure 5 show where incoming and outgoing attacks originate
from.
2 Communications with malicious IP addresses may be slightly lower than shown due to false positives from a
threat intelligence data source.
Figure 5. Outgoing communication to malicious IP addresses detected by Azure Security Center in 1Q17, by address location
Search engines such as Bing have taken a number of measures to help protect
users from drive-by downloads. As Bing indexes webpages, they are assessed
for malicious elements or malicious behavior. If the site owner is registered with
Bing as a webmaster, they are sent a warning about the malicious content, and
can request a reevaluation of the site after taking care of the problem. Because
the owners of compromised sites are usually victims themselves, the sites are
not removed from the Bing index. Instead, clicking the link in the list of search
results displays a prominent warning, saying that the page may contain
malicious software, as shown in Figure 7.
• Bing detected 0.17 drive-by download pages for every 1,000 pages in the
index in March 2017.
Figure 9 and Figure 10 show trends for the locations with the highest and lowest
concentrations of drive-by download pages in 2017.
Taiwan
7
Drive-by download pages per 1,000 URLs
2
Iran
1
Russia
Hong Kong SAR
0 China
January February March
Figure 10. Monthly trends for countries/regions with the lowest concentration of drive-by download pages in March 2017
0.010
0.009 Peru
0.008
Drive-by download pages per 1,000 URLs
0.007
0.006
0.005
0.004
0.003
Costa Rica
0.002
Belize
Kuwait
0.001
0.000 Luxembourg
January February March
12%
Encounter rate (percent of all reporting computers)
10%
8%
6%
4%
2%
0%
January February March
3 Encounter rate does not include threats that are blocked by a web browser before being detected by
antimalware software.
4 For information about the products and services that provide data for this report, see “Appendix B: Data
Threat categories
Windows Defender Security Intelligence (WDSI; formerly called the Microsoft
Malware Protection Center, or MMPC) classifies individual threats into types
based on a number of factors, including how the threat spreads and what it is
designed to do. To simplify the presentation of this information and make it
easier to understand, the Microsoft Security Intelligence Report groups these
types into categories based on similarities in function and purpose.
7%
Trojans
Encounter rate (percent of all reporting computers)
6%
5%
4%
Worms
3% Downloaders &
Droppers
Viruses
2% Other Malware
Obfuscators &
Injectors
1% Backdoors
Password Stealers
& Monitoring Tools
0% Ransomware
January February March Exploits
2.5%
Encounter rate (percent of all reporting computers)
2.0%
Browser
1.5% Modifiers
Software
Bundlers
1.0%
0.5%
Adware
0.0%
January February March
Threat families
Figure 15 and Figure 16 show trends for the top malicious and unwanted
software families that were detected on computers by Microsoft real-time
antimalware products worldwide in 1Q17.
5Microsoft has published the criteria that the company uses to classify programs as unwanted software at
https://www.microsoft.com/wdsi/antimalware-support/malware-and-unwanted-software-evaluation-criteria.
For programs that have been classified as unwanted software, Microsoft provides a dispute resolution process
to allow for reporting of potential false positives and to provide software vendors with the opportunity to
request investigation of a rating with which they do not agree.
1.6%
Win32/Xadupi
1.4%
Encounter rate (percent of all reporting computers)
1.2%
1.0% Win32/Skeeyah
Win32/Ghokswa
Win32/Fuery
0.8%
Win32/Spursint
Win32/Vigorf
0.6%
0.4%
0.2%
0.0%
January February March
0.8%
0.7% Win32/Diplugem
Encounter rate (percent of all reporting computers)
0.6%
0.5%
Win32/Neobar
Win32/Foxiebro
0.4%
0.3%
Win32/Pokki
Win32/SupTab
0.2% Win32/KipodToolsCby
0.1%
0.0%
January February March
Some programs don’t meet the criteria to be considered unwanted software but
still exhibit behaviors that may be considered undesirable, particularly in
enterprise environments. Microsoft classifies these programs as potentially
unwanted applications (PUA). For example, a program that displays additional
advertisements in the browser might not be classified as unwanted software if it
clearly identifies itself as the source of the ads, but may be considered
potentially unwanted. Users often end up installing these programs because
they were installing an application that they wanted, and the installer offered to
install additional software—usually with the offer acceptance checked by default
and often without the user realizing they are agreeing to install the additional
software. These programs can also cause problems for network
administrators—they can affect computer performance, increase the workload
for the IT help desk, put computers and data at risk of being compromised
through exploits, and make it more difficult to identify malware infections
among the noise. To provide organizations with additional options for dealing
with programs classified as PUA, Microsoft offers enterprise users of System
Center Endpoint Protection (SCEP) the ability to block them from being installed
on their networks.
Win32/AskToolbar
10.8% Win32/MyWebSearch
10.1%
Win32/CandyOpen
Win32/InstallCore 9.7%
16.6%
Win32/Slimware
5.0%
Win32/DownloadSponsor
Win32/Shoppers 3.3%
3.1%
Other
35.0% Win32/uTorrent
2.2%
Win32/Conduit Win32/DownloadAdmin
2.0% 2.2%
100%
90%
80%
Percent of RCE and EOP CVEs
70%
60%
27 70
50% 52 22 2
40%
30%
20%
10%
2 7
0% 2
October November December January March*
* All updates originally scheduled for February were postponed to March. See
https://blogs.technet.microsoft.com/msrc/2017/02/14/february-2017-security-update-release/ for details.
Exploit kits
Exploit kits are collections of exploits bundled together and sold as commercial
software or as a service. Prospective attackers buy or rent exploit kits on
malicious hacker forums and through other illegitimate outlets. A typical kit
comprises a collection of webpages that contain exploits for several
vulnerabilities in popular web browsers and browser add-ons. When the
attacker installs the kit on a malicious or compromised web server, visitors who
don’t have the appropriate security updates installed are at risk of having their
computers compromised through drive-by download attacks. (See page 8 for
more information about drive-by downloads.)
Figure 19. How a typical exploit kit works
700,000
600,000
HTML/Meadgive
(RIG)
Blocks of exploit kit landing pages
500,000
400,000
300,000
200,000
JS/SundownEK
(Sundown)
HTML/Kaixin
(KaiXin)
100,000 JS/DonxRef
(Gong Da)
HTML/SteganoEK
(Stegano)
0 JS/NeutrinoEK
January February March (Neutrino)
The Angler (Axpergle) and Neutrino exploit kits, which accounted for the
•
vast majority of exploit kit blocks during the first half of 2016,
The Angler and vanished in June and September of 2016, respectively. (See
“Exploit kits remain a cybercrime staple against outdated
Neutrino exploit
software – 2016 threat landscape review series” (January 23,
kits vanished in 2017) on the Windows Security blog at
June and blogs.technet.microsoft.com/mmpc for more information and
statistics.) The RIG kit (detected as Meadgive) was the largest
September of 2016, beneficiary of the disappearance of Angler and Neutrino, and
respectively. held a commanding share of the exploit kit market through the
first three months of 2017, with all other kits far behind.
• Exploit kit traffic volumes were significantly lower in 1Q17 than a year prior.
Angler alone regularly received more than a million blocks a month in 2016
before it disappeared. Although RIG has picked up traffic since the
disappearance of Angler and Neutrino, it has yet to approach the levels
displayed by the top kits in early 2016, and preliminary statistics from 2Q17
suggest that RIG has begun to decline as well.
Used in Widespread
CVE Exploit type Type Affecting Security Bulletin
attacks?
Ransomware
Ransomware is a type of malware that restricts access to data by encrypting files
or locking computer screens. It then attempts to extort money from victims by
asking for “ransom” in exchange for access to the data. Early ransomware
families displayed what looked like official warnings from well-known law
enforcement agencies, accusing the computer user of committing a computer-
related crime and demanding that the user pay a fine via electronic money
transfer or a virtual currency to regain control of the computer. In recent years,
many of the more commonly encountered ransomware families have dropped
this pretense; they simply encrypt important files on the computer and offer to
sell the user the private key to decrypt them. Attackers often demand payment
in Bitcoin, a popular virtual currency, or through other difficult-to-trace means.
Microsoft recommends that victims of ransomware infections not pay the so-
called fine. Ransomware is distributed by malicious attackers, not legitimate
authorities, and paying the ransom is no guarantee that the attacker will restore
the affected computer to a usable state. Microsoft provides free tools and
For the Microsoft perspective, read “The need for urgent collective action to
keep people safe online: Lessons from last week’s cyberattack” (May 14, 2017) on
the Microsoft On the Issues blog at blogs.microsoft.com/on-the-issues.
6 These families emerged in 2Q17 and are therefore not included in the statistics presented in this volume of
the Microsoft Security Intelligence Report, which covers data up to and including 1Q17 only. See the next
volume for WannaCrypt and Petya encounter statistics.
• Locations with the highest ransomware encounter rates include the Czech
Republic (0.17 percent), Korea (0.15 percent), and Italy (0.14 percent).
• Locations with the lowest ransomware encounter rates include Japan (0.012
percent in March 2017), China (0.014 percent), and the United States (0.02
percent).
• Ransomware disproportionately targeted computers in Europe in 1Q17. In
addition to the Czech Republic (0.17 percent), Italy (0.14 percent), Hungary
(0.14 percent), Spain (0.14 percent), Romania (0.13 percent), Croatia (0.13
percent), and Greece (0.12 percent) all had much higher ransomware
encounter rates than the average in March 2017.
Figure 23 displays encounter rate trends for several of the most commonly
encountered ransomware families worldwide.
0.010%
0.009%
Win32/Spora
Encounter rate (percent of all reporting computers)
0.008%
Win32/Cerber
0.007% Win32/Genasom
0.006%
0.005% Win32/Teerac
0.004%
Win32/Locky
0.003%
Win32/Reveton
0.002%
0.001%
0.000%
January February March
• All of the countries and regions shown in Figure 25 had more than 73
percent of computers reporting as protected in March 2017.
• The locations with the highest percentage of computers reporting as
protected by real-time security software include Finland, at 92.2 percent in
March 2017; Portugal, at 90.3 percent; and Denmark, at 90.2 percent.
• Locations with the fewest computers reporting as fully protected include
Peru, at 78.3 percent; Venezuela, at 80.4 percent; and Turkey, at 80.6
percent.
100%
Percent of computers reporting as other than Protected
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
Windows Vista* Windows 7* Windows 8† Windows 10
* Windows Vista and Windows 7 do not report expired subscriptions. †Includes Windows 8.1.
Phishing sites
Microsoft gathers information about phishing sites and impressions from
phishing impressions that are generated by users who choose to enable
SmartScreen.7 A phishing impression is a single instance of a user attempting to
visit a known phishing site with SmartScreen enabled and being warned, as
illustrated in Figure 27.
7See “Appendix B: Data sources” on page 45 for privacy statements and other information about the products
and services used to provide data for this report.
34 MALICIOUS WEBSITES
Figure 27. How Microsoft tracks phishing impressions
Target institutions
Some types of sites tend to consistently draw many more impressions per site
than others. Figure 28 and Figure 29 show the breakdown of phishing sites and
impressions by category as reported by SmartScreen.
Figure 28. Phishing sites reported by SmartScreen for each type of phishing site, January–March 2017
50%
45%
40% Online
services
35% Financial sites
Percent of all sites
30%
25%
20% E-commerce
15%
10%
5% Social
networking
0% Gaming
January February March
45%
35% Online
services
30%
Percent of all impressions
25%
20%
E-commerce
15%
Social
10% networking
5%
0% Gaming
January February March
• Phishing sites that targeted online services accounted for the largest
number of active phishing URLs during 1Q17, and also received the largest
share of impressions during the period, despite decreasing in relative terms
in February and March.
• Financial institutions have always been popular phishing targets because of
their potential for providing direct illicit access to victims’ bank accounts.
Sites that targeted financial institutions accounted for the second-largest
share of both attacks and impressions during 1Q17 overall, and accounted
for the largest share of impressions in February and March.
• The other three categories each accounted for a small percentage of both
sites and impressions.
36 MALICIOUS WEBSITES
Figure 30. Phishing sites per 1,000 Internet hosts for locations around the world in March 2017
• SmartScreen detected 6.3 phishing sites per 1,000 Internet hosts worldwide
in March 2017.
• Locations hosting higher than average concentrations of phishing sites
include Ukraine (13.2 per 1,000 Internet hosts in March), South Africa (10.3),
Indonesia (9.6), and Denmark (9.7). Locations with low concentrations of
phishing sites include China (0.6), Taiwan (0.6), Korea (0.7), and Mexico (1.2).
Figure 31. Phishing impressions by client location per 1,000,000 pageviews in March 2017
38 MALICIOUS WEBSITES
• Locations with the lowest percentages of malicious downloads include New
Zealand (0.0003 percent in March 2017), Ireland (0.0008 percent), and
Sweden (0.001 percent).
40 MALICIOUS WEBSITES
Appendixes
Appendix A: Threat naming conventions ........................................................... 43
Appendix B: Data sources ........................................................................................ 45
Appendix C: Worldwide encounter rates ........................................................... 48
Glossary ......................................................................................................................... 52
Threat families referenced in this report .............................................................57
Index ................................................................................................................................ 61
42 MALICIOUS WEBSITES
Appendix A: Threat naming
conventions
Microsoft names the malware and unwanted software that it detects according
to the Computer Antivirus Research Organization (CARO) Malware naming
scheme.
When Microsoft analysts research a particular threat, they determine what each
of the components of the name will be.
Type
The type describes what the threat does on a computer. Worms, trojans, and
viruses are some of the most common types of threats that Microsoft detects.
Platform
The platform refers to the operating system (such as Windows, Mac OS X, and
Android) that the threat is designed to work on. Platforms can also include
programming languages and file formats.
Family
A group of threats with the same name is known as a family. Sometimes
different security software companies use different names.
Additional information
Additional information is sometimes used to describe a specific file or
component that is used by another threat in relation to the identified threat. In
the preceding example, the !lnk indicates that the threat is a shortcut file used by
the Backdoor:Win32/Caphaw.D variant, as shortcut files usually use the
extension .lnk.
8Encounter rate are shown for locations with at least 100,000 computers running Microsoft real-time security
products during a month. Only computers whose users have opted in to provide data to Microsoft are
considered when calculating encounter rates.
ActiveX control
A software component of Microsoft Windows that can be used to create and
distribute small applications through Internet Explorer. ActiveX controls can be
developed and used by software to perform functions that would otherwise not
be available using typical Internet Explorer capabilities. Because ActiveX controls
can be used to perform a wide variety of functions, including downloading and
running programs, vulnerabilities discovered in them may be exploited by
malware. In addition, cybercriminals may also develop their own ActiveX
controls, which can do damage to a computer if a user visits a webpage that
contains the malicious ActiveX control.
adware
A program that displays advertisements. Although some adware can be
beneficial by subsidizing a program or service, other adware programs may
display advertisements without adequate consent.
backdoor trojan
A type of trojan that provides attackers with remote unauthorized access to and
control of infected computers. Bots are a subcategory of backdoor trojans.
Bitcoin
A form of digital currency. Bitcoins can be used to buy things online or exchange
them for real money.
browser modifier
A program that changes browser settings, such as the home page, without
adequate consent. This also includes browser hijackers.
credentials
See account credentials.
52 GLOSSARY
detection signature
A set of characteristics that can identify a malware family or variant. Signatures
are used by antimalware products to determine whether a file is malicious or
not.
downloader
See downloader/dropper.
downloader/dropper
A form of trojan that installs other malicious files to a computer that it has
infected, either by downloading them from a remote computer or by obtaining
them directly from a copy contained in its own code.
dropper
See downloader/dropper.
encounter
An instance of security software detecting a threat and blocking, quarantining,
or removing it from the computer.
encounter rate
The percentage of computers running Microsoft real-time security software that
report detecting malware or potentially unwanted software, or report detecting
a specific threat or family, during a period.
EOP
See elevation of privilege (EOP).
exploit
Malicious code that takes advantage of software vulnerabilities to infect a
computer or perform other harmful actions.
exploit kit
A collection of exploits bundled together and sold as commercial software. A
typical kit contains a collection of web pages that contain exploits for
vulnerabilities in popular web browsers and add-ons, along with tools for
managing and updating the kit.
in the wild
Said of malware that is currently detected on active computers connected to the
Internet, as compared to those confined to internal test networks, malware
research laboratories, or malware sample lists.
infection
The presence of malware on a computer, or the act of delivering or installing
malware on a computer. Also see encounter.
malicious software
Programs that perform malicious actions on a computer, such as stealing
banking details, locking a computer until the user pays a ransom, or using the
computer to send spam. Malicious software is a type of malware. Also see
unwanted software.
malware
The general name for programs that perform unwanted actions on a computer,
such as stealing personal information. Microsoft classifies malware as either
malicious software or unwanted software.
malware impression
A single instance of a user attempting to visit a page known to host malware and
being blocked by Windows Defender SmartScreen in Microsoft Edge or Internet
Explorer. Also see phishing impression.
phishing
A method of credential theft that tricks Internet users into revealing personal or
financial information online. Phishers use phony websites or deceptive email
messages that mimic trusted businesses and brands to steal personally
identifiable information (PII), such as user names, passwords, credit card
numbers, and identification numbers.
54 GLOSSARY
phishing impression
A single instance of a user attempting to visit a known phishing page and being
blocked by Windows Defender SmartScreen in Microsoft Edge or Internet
Explorer. Also see malware impression.
PUA
See potentially unwanted application (PUA).
ransomware
A type of malware that prevents use of a computer or access to the data that it
contains until the user pays a certain amount to a remote attacker (the
“ransom”). Computers that have ransomware installed usually display a screen
containing information on how to pay the “ransom.” A user cannot usually
access anything on the computer beyond the screen.
RCE
See remote code execution (RCE).
sandbox
A specially constructed portion of a computing environment in which potentially
dangerous programs or processes may run without causing harm to resources
outside the sandbox.
signature
See detection signature.
social engineering
A technique that defeats security precautions by exploiting human
vulnerabilities. Social engineering scams can be both online (such as receiving
email messages that ask the recipient to click the attachment, which is actually
malware) and offline (such as receiving a phone call from someone posing as a
representative from one’s credit card company). Regardless of the method
software bundler
A program that installs unwanted software on a computer at the same time as
the software the user is trying to install, without adequate consent.
spam
Bulk unsolicited email. Malware authors may use spam to distribute malware,
either by attaching the malware to email messages or by sending a message
containing a link to the malware. Malware may also harvest email addresses for
spamming from compromised machines or may use compromised machines to
send spam.
unwanted software
A program with potentially unwanted functionality that may affect the user’s
privacy, security, or computing experience. Unwanted software is a type of
malware. Also see malicious software.
virus
Malware that replicates, typically by infecting other files in the computer, to
allow the execution of the malware code and its propagation when those files
are activated.
vulnerability
A weakness, error, or poor coding technique in a program that may allow an
attacker to exploit it for a malicious purpose.
wild
See in the wild.
worm
Malware that spreads by spontaneously sending copies of itself through email
or by using other communication mechanisms, such as instant messaging (IM)
or peer-to-peer (P2P) applications.
zero-day exploit
An exploit that targets a zero-day vulnerability.
zero-day vulnerability
A vulnerability in a software product for which the vendor has not yet published
a security update.
56 GLOSSARY
Threat families referenced in
this report
The definitions for the threat families referenced in this report are adapted from
the Windows Defender Security Intelligence encyclopedia
(microsoft.com/wdsi/threats), which contains detailed information about a large
number of malicious software and unwanted software families. See the
encyclopedia for more in-depth information and guidance for the families listed
here and throughout the report.
Win32/Adposhel. Adware that can show extra ads inside and outside the web
browser.
Win32/Floxif. A family of viruses that infect Windows executable and DLL files to
download and install other malware onto the computer.
Win32/Foxiebro. A browser modifier that can inject ads to search results pages,
modify web pages to insert ads, and open ads in new tabs.
Win32/Gamarue. A worm that is commonly distributed via exploit kits and social
engineering. Variants have been observed stealing information from the local
computer and communicating with command-and-control (C&C) servers
managed by attackers.
Win32/Locky. Ransomware that encrypts files on the computer, and directs the
user to a Tor webpage to pay for the decryption key. It often arrives via spam as
an infected Microsoft Word .doc file.
Win32/Macoute. A worm that can spread itself to removable USB drives, and
may communicate with a remote host.
Win32/Mupad. A threat that can modify browser and proxy settings, which can
result in lower browser security. It may be downloaded from torrent sites.
JS/Nemucod. A family of .zip attachments that try to install other malware when
opened.
Win32/Nuqel. A worm that spreads via mapped drives and certain instant
messaging applications. It may modify system settings, connect to certain
websites, download arbitrary files, or take other malicious actions.
Win32/SupTab. A browser modifier that installs itself and changes the browser’s
default search provider, without obtaining the user’s consent for either action.
Win32/Tupym. A worm that copies itself to the system folder of the affected
computer, and attempts to contact remote hosts.
62 INDEX
Morocco, 50 Réunion, 51
MSRT. See Malicious Software Removal Tool Reveton, 30
(MSRT) RIG. See Meadgive
multifactor authentication, 4, 5 Romania, 29, 51
Mupad, 15, 59 Russia, 10, 51
Myanmar, 50 Russian language, 30
MyWebSearch, 21 Sasquor, 18, 59, 60
Nemucod, 16, 59 Saudi Arabia, 51
Neobar, 19, 58, 59 SCEP. See System Center Endpoint
Nepal, 50 Protection
Neshta, 15, 59 Security Development Lifecycle (SDL), 23
Netherlands, 50 security software, real-time, 31–33
Neutrino. See NeutrinoEK Senegal, 51
NeutrinoEK, 24 Serbia, 51
New Zealand, 39, 50 Shadow Brokers, 26
Nigeria, 38, 50 Singapore, 39, 51
Norway, 15, 50 Skeeyah, 18, 59
Nuqel, 14, 59 Slimware, 21
Obfuscators & Injectors (category), 16 Slovakia, 51
Office 365, 46, 47 Slovenia, 51
Oman, 50 SmartScreen. See Windows Defender
OpenCandy. See CandyOpen SmartScreen
Other Malware (category), 16 software bundlers, 17
Pakistan, 14, 50 South Africa, 37, 38, 51
Panama, 50 Spain, 29, 51
Pangimop, 31 spam, 6, 45, 54, 56, 59
Paraguay, 50 Spora, 30, 31, 60
Password Stealers & Monitoring Tools Spursint, 60
(category), 16 Sri Lanka, 51
passwords, 3–5 SupTab, 18, 59, 60
Peru, 32, 50 Sweden, 15, 39, 51
Petya, 28 Switzerland, 51
Philippines, 50 System Center Endpoint Protection, 20, 46,
phishing, v, 3, 4, 5, 6, 39, 40, 46 47
by country or region, 36–38 Taiwan, 10, 37, 39, 51
target institutions, 35–36 Tanzania, 51
Pokki, 19, 59 targeted attacks, 25
Poland, 50 Teerac, 30
Portugal, 32, 50 Thailand, 51
potentially unwanted applications, 20–21 Trinidad and Tobago, 51
PUA. See potentially unwanted applications trojans, 16, 18, 43, 52
Puerto Rico, 50 Tunisia, 51
Qatar, 50 Tupym, 14, 60
ransomware, 16, 26, 27–31 Turkey, 32, 39, 51
64 INDEX
One Microsoft Way
Redmond, WA 98052-6399
microsoft.com/security