Microsoft Security Intelligence Report
Total Page:16
File Type:pdf, Size:1020Kb
An in-depth perspective on software vulnerabilities and exploits, malware, potentially unwanted software, and malicious websites Microsoft Security Intelligence Report Volume 14 July through December, 2012 Microsoft Security Intelligence Report This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2013 Microsoft Corporation. All rights reserved. Microsoft, the Microsoft logo, Active Directory, ActiveX, Bing, Forefront, Hotmail, Internet Explorer, MSDN, Outlook, the Security Shield logo, SmartScreen, System Center, Visual Basic, Win32, Windows, Windows Server, and Windows Vista are trademarks of the Microsoft group of companies. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. July–December 2012 i Authors Danielle Alyias Paul Henry Tim Rains Microsoft Trustworthy Computing Wadeware LLC Microsoft Trustworthy Computing Dennis Batchelder Jeff Jones Vidya Sekhar Microsoft Protection Technologies Microsoft Trustworthy Computing Microsoft Malware Protection Center Joe Blackbird Jimmy Kuo Holly Stewart Microsoft Malware Protection Center Microsoft Malware Protection Center Microsoft Malware Protection Center Joe Faulhaber Marc Lauricella Matt Thomlinson Microsoft Malware Protection Center Microsoft Trustworthy Computing Microsoft Trustworthy Computing David Felstead Le Li Terry Zink Bing Microsoft Windows Safety Platform Microsoft Forefront Online Protection for Exchange Nam Ng Microsoft Trustworthy Computing Contributors Horea Coroiu Greg Lenti Cynthia Sandvick Microsoft Malware Protection Center CSS Security Readiness & Response Microsoft Trustworthy Computing Team Methusela Cebrian Ferrer Richard Saunders Microsoft Malware Protection Center Wei Li Microsoft Trustworthy Computing Microsoft Malware Protection Center Tanmay Ganacharya Jasmine Sesso Microsoft Malware Protection Center Marianne Mallen Microsoft Malware Protection Center Microsoft Malware Protection Center Enrique Gonzalez Frank Simorjay Microsoft Malware Protection Center Daric Morton Microsoft Trustworthy Computing Microsoft Services Heather Goudey Chris Stubbs Microsoft Malware Protection Center Yurika Muraki Microsoft Malware Protection Center CSS Japan Security Response Team Angela Gunn Norie Tamura Microsoft Trustworthy Computing Jeong Wook Oh CSS Japan Security Response Team Microsoft Malware Protection Center Satomi Hayakawa Vincent Tiu CSS Japan Security Response Team Takumi Onodera Microsoft Malware Protection Center Microsoft Premier Field Engineering, Ben Hope Henk van Roest Japan Microsoft Malware Protection Center CSS Security EMEA Daryl Pecelj Aaron Hulett Steve Wacker Microsoft IT Information Security and Microsoft Malware Protection Center Wadeware LLC Risk Management Michael Johnson Shawn Wang Anthony Penta Microsoft Malware Protection Center Microsoft Malware Protection Center Microsoft Windows Safety Platform Lesley Kipling Iaan Wiltshire Hilda Larina Ragragio Microsoft EMEA Security Incident Microsoft Malware Protection Center Microsoft Malware Protection Center Response Team Dan Wolff Tim Reckmeyer Aneesh Kulkarni Microsoft Malware Protection Center Microsoft Services Microsoft Windows Safety Platform Laura A. Robinson Jenn LeMond Microsoft Information Security & Risk Microsoft IT Information Security and Management Risk Management ii Microsoft Security Intelligence Report, Volume 14 Table of Contents About this report ..................................................................................................................................... v Executive Foreword ............................................................................................................................... vi Trustworthy Computing: Security engineering at Microsoft ..................................................... vii Running unprotected: Measuring the benefits of real-time security software....................... 1 Why go without real-time antimalware protection? ............................................................... 3 Real-time protection statistics ....................................................................................................... 4 Operating system statistics ........................................................................................................ 6 Geographic statistics .................................................................................................................. 11 Guidance: Fighting infection with real-time protection ......................................................... 13 Worldwide threat assessment ............................................................................................................ 15 Vulnerabilities ......................................................................................................................................... 17 Industry-wide vulnerability disclosures ...................................................................................... 17 Vulnerability severity ....................................................................................................................... 18 Vulnerability complexity ................................................................................................................ 20 Operating system, browser, and application vulnerabilities ................................................ 21 Microsoft vulnerability disclosures .............................................................................................. 23 Guidance: Developing secure software .................................................................................... 24 Exploits .................................................................................................................................................... 25 Exploit families .................................................................................................................................. 27 Java exploits ...................................................................................................................................... 28 HTML and JavaScript exploits ...................................................................................................... 29 Document exploits ........................................................................................................................... 31 Operating system exploits ............................................................................................................ 32 Adobe Flash Player exploits.......................................................................................................... 35 Malware and potentially unwanted software ............................................................................... 37 Global infection rates ..................................................................................................................... 37 Operating system infection rates ................................................................................................ 43 Threat categories ............................................................................................................................ 45 Threat categories by location ................................................................................................. 46 Threat families .................................................................................................................................. 48 Threat families by platform ...................................................................................................... 50 Rogue security software ................................................................................................................ 52 July–December 2012 iii Home and enterprise threats....................................................................................................... 55 Guidance: Defending against malware ..................................................................................... 58 Email threats .......................................................................................................................................... 59 Spam messages blocked .............................................................................................................. 59 Spam types ........................................................................................................................................ 61 Guidance: Defending against threats in email ........................................................................ 64 Malicious websites ............................................................................................................................... 65 Phishing sites .................................................................................................................................... 66 Target institutions ...................................................................................................................... 68 Global distribution of phishing sites ..................................................................................... 69 Malware hosting sites ...................................................................................................................