Microsoft Security Intelligence Report
Total Page:16
File Type:pdf, Size:1020Kb
Microsoft Security Intelligence Report Volume 11 An in-depth perspective on software vulnerabilities and exploits, malicious code threats, and potentially unwanted software in the first half of 2011 Microsoft Security Intelligence Report This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2011 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. ii Authors Joe Faulhaber John Lambert Dave Probert Hemanth Srinivasan Microsoft Malware Protection Microsoft Security Microsoft Security Microsoft Malware Protection Center Engineering Center Engineering Center Center David Felstead Marc Lauricella Tim Rains Holly Stewart Bing Microsoft Trustworthy Microsoft Trustworthy Microsoft Malware Protection Computing Computing Center Paul Henry Wadeware LLC Aaron Margosis Mark E. Russinovich Matt Thomlinson Microsoft Public Sector Microsoft Technical Fellow Microsoft Security Response Jeff Jones Services Center Microsoft Trustworthy Weijuan Shi Computing Michelle Meyer Windows Business Group Jeff Williams Microsoft Trustworthy Microsoft Malware Protection Ellen Cram Kowalczyk Computing Adam Shostack Center Microsoft Trustworthy Microsoft Trustworthy Computing Anurag Pandit Computing Scott Wu Windows Live Safety Microsoft Malware Protection Jimmy Kuo Platform Frank Simorjay Center Microsoft Malware Protection Microsoft Trustworthy Center Anthony Penta Computing Terry Zink Windows Live Safety Microsoft Forefront Online Platform Protection for Exchange Contributors Roger Capriotti Vinny Gullotto Ken Malcolmson Richard Saunders Windows Live Safety Microsoft Trustworthy Microsoft Trustworthy Microsoft Trustworthy Platform Computing Computing Computing Doug Cavit Satomi Hayakawa Takumi Onodera Jasmine Sesso Microsoft Trustworthy CSS Japan Security Response Microsoft Premier Field Microsoft Malware Protection Computing Team Engineering, Japan Center CSS Japan Security Forbes Higman Daryl Pecelj Norie Tamura Response Team Windows Live Safety Microsoft IT Information CSS Japan Security Response Microsoft Japan Platform Security and Risk Team Management Dave Forstrom Yuhui Huang Matt Thomlinson Microsoft Trustworthy Microsoft Malware Protection Kathy Phillips Microsoft Trustworthy Computing Center Microsoft Legal and Computing Corporate Affairs Eric Foster Aaron Hulett Patrik Vicol Windows Live Safety Microsoft Malware Protection Tareq Saade Microsoft Malware Protection Platform Center Microsoft Malware Protection Center Center Enrique Gonzalez Hilda Larina Ragragio Steve Wacker Microsoft Malware Protection Microsoft Malware Protection Wadeware LLC Center Center Heather Goudey Eric Lawrence Microsoft Malware Protection Windows Live Safety Center Platform iii iv Table of Contents About This Report ............................................................................................................................... ix Trustworthy Computing: Security Engineering at Microsoft ................................................ x Key Findings Summary xi Zeroing In on Malware Propagation Methods 1 Background............................................................................................................................................. 3 Analysis and Results ............................................................................................................................. 5 A New Method for Classifying Malware Propagation ....................................................... 5 Data Used ........................................................................................................................................... 6 Analytic Methods ............................................................................................................................ 7 Results ................................................................................................................................................ 10 Insights ................................................................................................................................................... 12 User Interaction .............................................................................................................................. 13 Feature Abuse ................................................................................................................................. 13 Exploit Age ....................................................................................................................................... 14 Zero-Day Exploits: A Supplemental Analysis ................................................................. 14 Analysis Details .................................................................................................................................... 17 The Project Broad Street Taxonomy ...................................................................................... 17 Using the Taxonomy ............................................................................................................... 17 Vulnerability Subprocess ....................................................................................................... 20 Methodology Details ................................................................................................................... 21 v Other classifications of malware ......................................................................................... 22 Conclusion ............................................................................................................................................ 24 Call to Action .................................................................................................................................. 24 Advice to IT Professionals on Social Engineering .................................................................. 25 Organizations ................................................................................................................................. 25 Software ............................................................................................................................................ 27 People ................................................................................................................................................ 27 Worldwide Threat Assessment 29 Vulnerabilities ...................................................................................................................................... 31 Industry-Wide Vulnerability Disclosures .............................................................................. 31 Vulnerability Severity ................................................................................................................... 32 Vulnerability Complexity ............................................................................................................ 34 Operating System, Browser, and Application Vulnerabilities ....................................... 35 Microsoft Vulnerability Disclosures ........................................................................................ 36 Guidance: Developing Secure Software ............................................................................... 37 Exploits ................................................................................................................................................... 38 Java Exploits .................................................................................................................................... 40 HTML and JavaScript Exploits .................................................................................................. 41 Document Parser Exploits .......................................................................................................... 42 Microsoft Office File Format Exploits ............................................................................... 43 Operating System Exploits ......................................................................................................... 45 Adobe Flash Player Exploits ...................................................................................................... 47 Malware and Potentially Unwanted Software ......................................................................... 49 CCM Calculation Changes ......................................................................................................... 49 Global Infection Rates ................................................................................................................. 51 Regional Effective Practices.................................................................................................. 56 Operating System Infection Rates .......................................................................................... 57 vi Threat Categories .......................................................................................................................... 60 Threat Categories By Location ............................................................................................ 61 Threat Families ..............................................................................................................................