Skip to main content

Trustworthy Computing

Microsoft Security Newsletter

Stay up to date with security insights, resources, best practices, and events for IT professionals and developers. Browse past newsletters or subscribe to get the latest news delivered to your inbox.

Subscribe

 

 
 
Welcome to May’s Security Newsletter!

Our newsletter this month focuses on threat intelligence and security guidance for enterprise organizations. Earlier this month, Microsoft released its biannual cybersecurity report, the Microsoft Security Intelligence Report. One of the noteworthy items to come out of the report was the threefold increase in deception tactics used to compromise systems worldwide, which is now the top threat facing enterprise environments worldwide. Taking advantage of people’s desire to get a good deal, cybercriminals are bundling malware with free programs or software downloaded online.

One of the most common pieces of deceptive download bundles contained malicious software that quietly abused the victim’s computer by performing clickfraud. Clickfraud makes cybercriminals money by pretending to be a person clicking on ads from your computer or by redirecting your search results.

Deceptive downloads are a problem that is global in scope. In fact, deceptive downloads were one of the top threats in 105 out of 110 countries/regions studied worldwide. In the second half of 2013, programs known to use deceptive downloads were encountered by more than 60 out of every 1,000 systems worldwide. The good news is that there are some best practices people can take to help protect against deceptive tactics:

Use newer software that provides enhanced protections.
 
Keep all of the software installed on your system up-to-date. This includes software from Microsoft, Adobe, Oracle, and others.
 
When downloading files or software online, make sure that you are doing so from a trusted vendor.
 
Run up-to-date antimalware.
 
Think before you click: don’t click on links or open attachments from untrusted sources.
 
Back up your files.


Of course, these are just a few of the many key learnings from the latest. For more information on threat intelligence for your country/region, I encourage you to visit http://www.microsoft.com/sir.

Tim Rains Best regards,
Tim Rains, Director
Microsoft Trustworthy Computing


Have feedback on how we can improve this newsletter? Email us at secnlfb@microsoft.comand share your ideas.

 

Top Stories
 
Protecting Data and Privacy in the Cloud
Learn how a privacy-inclusive approach to engineering informs how Microsoft designs, creates, and operates services by downloading the new white paper entitled, Protecting Data and Privacy in the Cloud. The paper outlines Microsoft’s approach and processes to helping to ensure that customer data in enterprise services like Windows Azure, Office 365, Dynamics CRM Online, and Windows Intune, remains private.

Toward a Trusted Supply Chain: A Risk Based Approach to Managing Software Integrity
Explore a simple framework for the pragmatic inclusion of software integrity risk management practices in the product development process and online services operations.

Critical Infrastructure Protection Concepts and Continuum
Find out how trustworthy policies and plans, resilient operations, and innovative investments—enabled by trusted collaboration—form a continuum for protecting critical infrastructure.

Security Trends in Retail Organizations
Download a new report that identifies security trends in retail organizations and outlines key findings and recommendations around cloud computing and safe, secure practices.

 

Security Guidance
 

Security Tip of the Month: Mitigate the Risk of Deceptive Downloads
Cybercriminals are perpetually trying different techniques to distribute malware and potentially unwanted software. One technique we are increasingly seeing at the Microsoft Malware Protection Center is the use of legitimate or "clean" software to deliver malicious payloads. In fact, this deceptive download tactic was one of the main drivers for an increase in malware encounter rates in the last half of 2013. The latest Microsoft Security Intelligence Report indicates that the primary culprit was Win32/Sefnit, a Trojan family that affected worldwide malware encounter rates after its malicious files were bundled with clean software downloads.

Recently, we have seen a new twist on this deceptive tactic: previously clean applications that suddenly change their behavior and start installing malware or adware. This infection vector poses new security considerations because files that were previously determined as clean can change their behavior without warning and deliver malicious content or steal confidential information.

There are any number of reasons why clean software makes this switch to malicious behavior, but some of the more common include:

The software’s control/update servers are hacked (for example, by a brute force attack against weak passwords, through the use of stolen credentials, by the actions of a rogue employee, or through other vulnerabilities).
 
The software is purchased for the purpose of delivering malicious content.
 
The software’s command and control server domains expire and are then registered by other parties.


The Filcout deception

This switch from clean to malicious behavior was first encountered in some third-party browser extensions early last year. In this case, certain popular extensions were purchased and ownership was transferred. The new extension owner would push out an update to change the functionality of the extension, thus forcing it to render advertisements or spy on the user’s browsing activities.

More recently we have seen other software exhibiting a similar behavior. The most notable case is the addition of a new layer of deception to Sefnit with the use of the previously clean application that we detect as Win32/Filcout. Filcout is our detection for malicious software that claims to find the right program to run an unknown file type. Initially this program showed no signs of malicious behavior and gained a large installation base. At this stage, the application appeared innocuous from an enterprise security perspective.

However, in late March 2014, its behavior changed without warning. The software’s update mechanisms began responding with instructions to install Sefnit. Sefnit detections grew from 20,000 unique computer detections per day, to more than 900,000 within a two-week period as its malicious files were installed on millions of computers across the globe.


Microsoft Security Software detects and removes Sefnit, and once the connection to Filcout was identified we began detecting and removing the application. These detections were updated for all computers protected with our real-time security products and the stand-alone Malicious Software Removal tool (MSRT). To date the MSRT has removed Filcout from more than 9.4 million computers.

Mitigating the risk

As seen in the Filcout case, behavior changes from previously clean applications can have the potential to affect the security and confidentiality of enterprise systems. The potential risk also raises several considerations when assessing software for internal use – including the reputation of the publisher.

One of the best ways to help protect against this type of malware delivery is to take the stance that a breach might be unavoidable.

It is also advisable to record and store full packet captures according to a retention policy. Aggregated network captures should be stored for a longer duration. Together, this data is important in breach response to identify the infected computers and stolen data, and it may be used to detect future breaches by running new NIDS signatures against historical data.

Preventing the risk of a breach in the first place is still very important, and there are several recommendations that can help protect enterprise systems from attacks such as this:

For the major browsers, use the application-policy settings to implement an extension whitelist. This can prevent extensions from being installed into browsers unless they are on an approved list.
 
Implement a software installation policy. This policy should include a process where employees must request approval before using software on the corporate network. The approval process should evaluate the request from a security and a legal perspective.
 
Include employee computer security training in the employee onboarding program, and refresh it on a set timeframe.
 
Monitor and enforce corporate policy compliance.
 
Run up-to-date, real-time security software to help detect and remove malware and potentially unwanted software.


Windows RT 8.1 in the Enterprise: Security
Learn how to leverage the security technologies in Windows RT 8.1, to help ensure that the devices are protected from the first time they are turned on. Explore how best to utilize smart cards, device encryption, BitLocker To Go, SmartScreen, Windows Defender, Windows Firewall, Network Access Protection and more.

Load Libraries Safely
Dynamically loading libraries in an application can lead to vulnerabilities if not secured properly. Get advice from the MSRC Engineering team on how to load a library using LoadLibraryEx() API and make use of options to make it safe.

 

This Month's Security Bulletins
 

May 2014 Security Bulletins

Critical

 
MS14-021:2965111 Security Update for Internet Explorer
 
MS14-022:2952166 Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution
 
MS14-029:2962482 Security Update for Internet Explorer


Important

 
MS14-023:2961037 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
 
MS14-024:2961033 Vulnerability in a Microsoft Common Control Could Allow Security Feature Bypass
 
MS14-025:2962486 Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege
 
MS14-026:2958732 Vulnerability in .NET Framework Could Allow Elevation of Privilege
 
MS14-027:2962488 Vulnerability in Windows Shell Handler Could Allow Elevation of Privilege
 
MS14-028:2962485 Vulnerability in iSCSI Could Allow Denial of Service
 

May 2014 Security Bulletin Resources:

 
Microsoft Security Response Center (MSRC) Blog Post
 
Security Bulletin Webcast
 
Security Bulletin Webcast Q&A
 

Security Events and Training
 
BYOD: Leverage Existing Infrastructure to Secure and Manage PCs and Devices
Thursday, June 5, 2014 – 12:00PM Pacific Time
Learn how to manage all your PCs and devices in a unified environment that gives you the ability to ensure that end users have the applications they need on the devices on their choice when they need them—while also enabling you to classify and further protect your data to meet compliance and security requirements.

Microsoft Webcast: Information about the June 2014 Security Bulletin Release
Wednesday, June 11, 2014 – 11:00AM Pacific Time
Join this webcast for a brief overview of the technical details of June 2014’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.

 
 

Essential Tools

 
Microsoft Security Bulletins
 
Microsoft Security Advisories
 
Security Compliance Manager
 
Microsoft Security Development Lifecycle Starter Kit
 
Enhanced Mitigation Experience Toolkit
 
Malicious Software Removal Tool
 
Microsoft Baseline Security Analyzer
 

Security Centers

 
Security TechCenter
 
Security Developer Center
 
Microsoft Security Response Center
 
Microsoft Malware Protection Center
 
Microsoft Privacy
 
Microsoft Security Product Solution Centers
 

Additional Resources

 
Trustworthy Computing Security and Privacy Blogs
 
Microsoft Security Intelligence Report
 
Microsoft Security Development Lifecycle
 
Malware Response Guide
 
Security Troubleshooting and Support Resources
 
Trustworthy Computing Careers
 
 
 
 
 microsoft.com/about/twcTrustworthy Computing 
 
 
 Microsoft respects your privacy. To learn more please read our online Privacy Statement.

If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies, please click here. These settings will not affect any other newsletters you’ve requested or any mandatory service communications you’ve requested that are considered part of certain Microsoft services.

To set your contact preferences for other Microsoft communications, click here.