Microsoft Security Intelligence Report Volume 7 January Through June 2009
Total Page:16
File Type:pdf, Size:1020Kb
Microsoft Security Intelligence Report Volume 7 January through June 2009 Microsoft Security Intelligence Report Microsoft Security Intelligence Report The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATU- TORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (elec- tronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copy- rights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Copyright © 2009 Microsoft Corporation. All rights reserved. Microsoft, the Microsoft logo, ActiveX, AppLocker, Bing, the Bing logo, BitLocker, Excel, Forefront, Hotmail, Internet Explorer, OneCare, Outlook, PowerPoint, the Security Shield logo, SmartScreen, SQL Server, Visual Basic, Visual Studio, Windows, the Windows Logo, Windows Live, Windows Media, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other coun- tries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 2 January through June 2009 Authors Richard Boscovich Tony Lee Paul Pottorff Microsoft Internet Safety and Enforcement Team Microsoft Malware Protection Center Windows Consumer Product Management T J Campana Ziv Mador Sterling Reasor Microsoft Internet Safety and Enforcement Team Microsoft Malware Protection Center Microsoft Malware Protection Center Darren Canavor Ritesh Mordani Christian Seifert Microsoft Security Engineering Center Microsoft Forefront Online Protection for Bing Bruce Dang Exchange Adam Shostack Microsoft Security Engineering Center Bala Neerumalla Microsoft Security Engineering Center Joe Faulhaber Microsoft Secure SQL Initiative Team George Stathakopoulos Microsoft Malware Protection Center Jonathan Ness Microsoft Security Response Center Vinny Gullotto Microsoft Security Engineering Center Adrian Stone Microsoft Malware Protection Center Hamish O’Dea Microsoft Security Response Center Yuhui Huang Microsoft Malware Protection Center Scott Wu Microsoft Malware Protection Center Sasi Parthasarathy Microsoft Malware Protection Center Jeff Jones Bing Terry Zink Microsoft Trustworthy Computing Anthony Penta Microsoft Forefront Online Protection John Lambert Microsoft Windows Safety Platform for Exchange Microsoft Security Engineering Center Contributors Fred Aaron Kathy Lambert Mike Reavey Microsoft Security Engineering Center Microsoft Legal and Corporate Affairs Microsoft Security Response Center Charles Anthe Jimin Li Marc Seinfeld Online Management Platform & Solutions Online Management Platform & Solutions Microsoft Malware Protection Center Kai Axford Ken Malcolmson Jinwook Shin Microsoft Trustworthy Computing Microsoft Trustworthy Computing Microsoft Security Engineering Center Doug Cavit Scott Molenkamp Sam Salhi Microsoft Trustworthy Computing Microsoft Malware Protection Center Microsoft Windows Safety Platform Nicola Cowie Patrick Nolan Matt Thomlinson Microsoft Security Engineering Center Microsoft Malware Protection Center Microsoft Security Engineering Center Dave Forstrom Price Oden Alan Wallace Microsoft Trustworthy Computing Microsoft IT Information Security Microsoft Trustworthy Computing Heather Goudey Ina Ragragio Jeff Williams Microsoft Malware Protection Center Microsoft Malware Protection Center Microsoft Malware Protection Center Michael Grady Tim Rains Microsoft Trustworthy Computing Microsoft Trustworthy Computing Roger Grimes Microsoft IT Information Security External Contributors Satomi Hayakawa Japan Security Response Team Andre DiMino Hideaki Kobayashi Sue Hotelling Shadowserver Foundation Information-Technology Promotion Agency, Japan Microsoft Internet Safety and Enforcement Team Paul Henry Toshiaki Kokado Aaron Hulett Technical Writer Information-Technology Promotion Agency, Japan Microsoft Malware Protection Center Hans-Peter Jedlicka Erka Koivunen Japan Security Response Team Federal Office for Information Safety, Germany Computer Emergency Response Team Microsoft Japan Leon Aaron Kaplan Communications Regulatory Authority, Finland Jeannette Jarvis National Computer Emergency Response Team Richard Perlotto Microsoft Customer Support Services of Austria Shadowserver Foundation Jimmy Kuo Huopio Kauto Torsten Voss Microsoft Malware Protection Center Computer Emergency Response Team DFN-CERT, Germany Communications Regulatory Authority, Finland 3 Microsoft Security Intelligence Report Table of Contents Authors, Contributors, External Contributors . 3 About This Report 7 Scope . 7 Reporting Period . 7 Conventions . 7 Data Sources . 7 Key Findings 8 Executive Foreword 15 Trustworthy Computing: Security Engineering at Microsoft Melissa Plus 10: Keeping People Safe in the Age of Malware 18 Ten Years of Malware and Security Threats, 1999–2009 . 18 Computer Security Today: Working Together to Close the Gap . 23 Case Study: The Conficker Working Group . 29 Strategies, Mitigations, and Countermeasures 33 Microsoft Malware Protection Center Malware and Potentially Unwanted Software Trends 36 Threat Naming Conventions . 36 Infection Rates and CCM . 37 Geographic Trends. 38 Best Practices Around the World . 44 Category Trends . 48 Operating System Trends . 50 Malware and Potentially Unwanted Software Families. 53 User Reaction to Alerts . 54 Trends in Sample Proliferation. 58 Threats at Home and in the Enterprise . 61 Malware and Signed Code . 64 Threat Combinations . 67 E-Mail Threats 72 Spam Trends and Statistics . 72 Geographic Origins of Spam Messages . 74 Reputation Hijacking . 76 Malware in E-Mail . 77 A Defense-in-Depth Strategy for E-Mail . 81 Malicious Web Sites 82 Analysis of Phishing Sites . 82 Analysis of Malware Hosts . 87 “Malvertising”: An Emerging Industry Threat . 92 4 January through June 2009 Top Malware and Spam Stories of 1H09 95 Win32/Conficker Update . 95 What Happened on April 1? . 99 Rogue Security Software Still a Significant Threat . 100 Automated SQL Injection Attacks . 102 Win32/Koobface Attacks Social Networks. 103 The Win32/Waledac Botnet and Spam . 104 Rogue ISP 3FN Taken Down . 106 Prolific Spammer Alan Ralsky Pleads Guilty . 107 Strategies, Mitigations, and Countermeasures 108 Microsoft Security Engineering Center Exploit Trends 112 Top Browser-Based Exploits . 113 Analysis of Drive-By Download Pages . 118 Document File Format Exploits . 126 Security Breach Trends 133 Social Security Numbers and Confidentiality. 136 Guidance for Organizations: Protecting Against a Data Breach . 138 Strategies, Mitigations, and Countermeasures 139 Microsoft Security Response Center Industry-Wide Vulnerability Disclosures 142 Vulnerability Disclosures . 142 Vulnerability Disclosure Date vs. Publication Date . 143 Vulnerability Severity . 144 Vulnerability Complexity . 146 Operating System and Browser Vulnerabilities . 148 Vulnerability Reports for Microsoft Products 150 Responsible Disclosures . 151 Microsoft Security Bulletins in 1H09 . 153 More Vendors Adopting Scheduled Release Strategies. 155 Exploitability Index . 155 Usage Trends for Windows Update and Microsoft Update 161 Update Clients and Services . 161 The Role of Automatic Updating . 163 Regional Variations in Update Service Usage . 164 Strategies, Mitigations, and Countermeasures 166 5 Microsoft Security Intelligence Report Afterword Call to Action: End to End Trust 168 MMPC Executive Afterword 169 Appendixes Appendix A: Full Geographic Data 172 Appendix B: Threat Assessments for Individual Locations 181 Australia . 181 Brazil . 184 China . 187 France . 190 Germany . 193 Gulf Cooperation Council States (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and United Arab Emirates) . 196 Japan . 199 Korea . 202 Malaysia . 205 Norway . 208 Russia . 211 South Africa . 214 United Kingdom . 217 United States . 220 Appendix C: Data Sources 223 Microsoft Products and Services . 223 Software Vulnerability and Breach Data . 225 Appendix D: Microsoft Security Bulletins in 1H09 227 Glossary 229 6 January through June 2009 About This Report Scope The Microsoft Security Intelligence Report (SIR) is published twice per year. These reports focus on data and trends observed in the first and second halves of each calendar year. Past reports and related resources are available for download at http://www.microsoft.com/sir. We continue to focus on malware data, software vulnerability disclosure data, vulnerability exploit data, and related trends in this seventh installment of the Security Intelligence Report. We hope that readers find the data, insights, and guidance provided