|Welcome to May’s Security Newsletter!|
Our newsletter this month focuses on threat intelligence and security guidance for enterprise organizations. Earlier this month, Microsoft released its biannual cybersecurity report, the
Microsoft Security Intelligence Report. One of the noteworthy items to come out of the report was the threefold increase in deception tactics used to compromise systems worldwide, which is now the top threat facing enterprise environments worldwide. Taking advantage of people’s desire to get a good deal, cybercriminals are bundling malware with free programs or software downloaded online.
One of the most common pieces of deceptive download bundles contained malicious software that quietly abused the victim’s computer by performing clickfraud. Clickfraud makes cybercriminals money by pretending to be a person clicking on ads from your computer or by redirecting your search results.
Deceptive downloads are a problem that is global in scope. In fact, deceptive downloads were one of the top threats in 105 out of 110 countries/regions studied worldwide. In the second half of 2013, programs known to use deceptive downloads were encountered by more than 60 out of every 1,000 systems worldwide. The good news is that there are some best practices people can take to help protect against deceptive tactics:
|•||Use newer software that provides enhanced protections.|
|•||Keep all of the software installed on your system up-to-date. This includes software from Microsoft, Adobe, Oracle, and others.|
|•||When downloading files or software online, make sure that you are doing so from a trusted vendor.|
|•||Run up-to-date antimalware.|
|•||Think before you click: don’t click on links or open attachments from untrusted sources.|
|•||Back up your files.|
Of course, these are just a few of the many key learnings from the latest. For more information on threat intelligence for your country/region, I encourage you to visit
| ||Best regards,|
Tim Rains, Director
Microsoft Trustworthy Computing
Have feedback on how we can improve this newsletter? Email us at
email@example.com share your ideas.
Protecting Data and Privacy in the Cloud|
Learn how a privacy-inclusive approach to engineering informs how Microsoft designs, creates, and operates services by downloading the new white paper entitled,
Protecting Data and Privacy in the Cloud. The paper outlines Microsoft’s approach and processes to helping to ensure that customer data in enterprise services like Windows Azure, Office 365, Dynamics CRM Online, and Windows Intune, remains private.
Toward a Trusted Supply Chain: A Risk Based Approach to Managing Software Integrity
Explore a simple framework for the pragmatic inclusion of software integrity risk management practices in the product development process and online services operations.
Critical Infrastructure Protection Concepts and Continuum
Find out how trustworthy policies and plans, resilient operations, and innovative investments—enabled by trusted collaboration—form a continuum for protecting critical infrastructure.
Security Trends in Retail Organizations
Download a new report that identifies security trends in retail organizations and outlines key findings and recommendations around cloud computing and safe, secure practices.
Security Tip of the Month: Mitigate the Risk of Deceptive Downloads
Cybercriminals are perpetually trying different techniques to distribute malware and potentially unwanted software. One technique we are increasingly seeing at the Microsoft Malware Protection Center is the use of legitimate or "clean" software to deliver malicious payloads. In fact, this deceptive download tactic was one of the main drivers for an increase in malware encounter rates in the last half of 2013. The latest
Microsoft Security Intelligence Report indicates that the primary culprit was
Win32/Sefnit, a Trojan family that affected worldwide malware encounter rates after its malicious files were bundled with clean software downloads.
Recently, we have seen a new twist on this deceptive tactic: previously clean applications that suddenly change their behavior and start installing malware or adware. This infection vector poses new security considerations because files that were previously determined as clean can change their behavior without warning and deliver malicious content or steal confidential information.
There are any number of reasons why clean software makes this switch to malicious behavior, but some of the more common include:
|•||The software’s control/update servers are hacked (for example, by a brute force attack against weak passwords, through the use of stolen credentials, by the actions of a rogue employee, or through other vulnerabilities).|
|•||The software is purchased for the purpose of delivering malicious content.|
|•||The software’s command and control server domains expire and are then registered by other parties.|
The Filcout deception
This switch from clean to malicious behavior was first encountered in some third-party browser extensions early last year. In this case, certain popular extensions were purchased and ownership was transferred. The new extension owner would push out an update to change the functionality of the extension, thus forcing it to render advertisements or spy on the user’s browsing activities.
More recently we have seen other software exhibiting a similar behavior. The most notable case is the addition of a new layer of deception to Sefnit with the use of the previously clean application that we detect as Win32/Filcout. Filcout is our detection for malicious software that claims to find the right program to run an unknown file type. Initially this program showed no signs of malicious behavior and gained a large installation base. At this stage, the application appeared innocuous from an enterprise security perspective.
However, in late March 2014, its behavior changed without warning. The software’s update mechanisms began responding with instructions to install Sefnit. Sefnit detections grew from 20,000 unique computer detections per day, to more than 900,000 within a two-week period as its malicious files were installed on millions of computers across the globe.
Microsoft Security Software detects and removes Sefnit, and once the connection to Filcout was identified we began detecting and removing the application. These detections were updated for all computers protected with our real-time security products and the stand-alone Malicious Software Removal tool (MSRT). To date the MSRT has removed Filcout from more than 9.4 million computers.
Mitigating the risk
As seen in the Filcout case, behavior changes from previously clean applications can have the potential to affect the security and confidentiality of enterprise systems. The potential risk also raises several considerations when assessing software for internal use – including the reputation of the publisher.
One of the best ways to help protect against this type of malware delivery is to take the stance that a breach might be unavoidable.
It is also advisable to record and store full packet captures according to a retention policy. Aggregated network captures should be stored for a longer duration. Together, this data is important in breach response to identify the infected computers and stolen data, and it may be used to detect future breaches by running new NIDS signatures against historical data.
Preventing the risk of a breach in the first place is still very important, and there are several recommendations that can help protect enterprise systems from attacks such as this:
|•||For the major browsers, use the application-policy settings to implement an extension whitelist. This can prevent extensions from being installed into browsers unless they are on an approved list.|
|•||Implement a software installation policy. This policy should include a process where employees must request approval before using software on the corporate network. The approval process should evaluate the request from a security and a legal perspective.|
|•||Include employee computer security training in the employee onboarding program, and refresh it on a set timeframe.|
|•||Monitor and enforce corporate policy compliance.|
|•||Run up-to-date, real-time security software to help detect and remove malware and potentially unwanted software.|
Windows RT 8.1 in the Enterprise: Security
Learn how to leverage the security technologies in Windows RT 8.1, to help ensure that the devices are protected from the first time they are turned on. Explore how best to utilize smart cards, device encryption, BitLocker To Go, SmartScreen, Windows Defender, Windows Firewall, Network Access Protection and more.
Load Libraries Safely
Dynamically loading libraries in an application can lead to vulnerabilities if not secured properly. Get advice from the MSRC Engineering team on how to load a library using LoadLibraryEx() API and make use of options to make it safe.
|This Month's Security Bulletins|
May 2014 Security Bulletins
May 2014 Security Bulletin Resources:
|Security Events and Training|
BYOD: Leverage Existing Infrastructure to Secure and Manage PCs and Devices|
Thursday, June 5, 2014 – 12:00PM Pacific Time
Learn how to manage all your PCs and devices in a unified environment that gives you the ability to ensure that end users have the applications they need on the devices on their choice when they need them—while also enabling you to classify and further protect your data to meet compliance and security requirements.
Microsoft Webcast: Information about the June 2014 Security Bulletin Release
Wednesday, June 11, 2014 – 11:00AM Pacific Time
Join this webcast for a brief overview of the technical details of June 2014’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.
| || |
| ||microsoft.com/about/twc||Trustworthy Computing|| |
| ||Microsoft respects your privacy. To learn more please read our online
Privacy Statement. |
If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies, please
click here. These settings will not affect any other newsletters you’ve requested or any mandatory service communications you’ve requested that are considered part of certain Microsoft services.
To set your contact preferences for other Microsoft communications,
| || |