{"id":13611,"date":"2012-10-10T13:02:00","date_gmt":"2012-10-10T12:02:00","guid":{"rendered":"https:\/\/aidanfinn.com\/?p=13611"},"modified":"2012-10-10T13:02:00","modified_gmt":"2012-10-10T12:02:00","slug":"microsoft-security-intelligence-report-h1-2012","status":"publish","type":"post","link":"https:\/\/aidanfinn.com\/?p=13611","title":{"rendered":"Microsoft Security Intelligence Report \u2013 H1 2012"},"content":{"rendered":"<p>Volume 13 (Jan-June 2012) of the Microsoft SIR has been <a href=\"http:\/\/download.microsoft.com\/download\/C\/1\/F\/C1F6A2B2-F45F-45F7-B788-32D2CCA48D29\/Microsoft_Security_Intelligence_Report_Volume_13_English.pdf\" target=\"_blank\">released<\/a>.&#160; Last year I read the same one, and Conficker was <em>still<\/em> the number 1 malware on domain-joined computers.&#160; What nuggets are there this year?<\/p>\n<p><em>Before we get there \u2026<\/em><\/p>\n<p>I heard of another report (Symantec I think) that a new kind of attack is being employed by hackers called a \u201cwater-hole attack\u201d. Much like Lions on the plains, the hackers lie in wait at locations where their prey comes to get something. So they deliberately place targeted malware on a site that they know their intended victim will visit, and wait.&#160; And eventually *bang* they hit and take over a machine in the networks of their victim.&#160; It\u2019s more efficient than the normal un-targeted drive-by attack.<\/p>\n<p>Hackers are also now attacking the supply chains of their prey.&#160; This is a good approach if you wanted to cripple a manufacturer, e.g. hit their suppliers so the manufacturer cannot produce.&#160; This is very effective now because of Just-in-Time manufacturing and exclusive supply contracts. The real victim (the manufacturer) can do nothing with their own IT security to defend against this.&#160; The only solutions are business ones: demand high levels of security\/compliance in suppliers, and have varied supply chains so one down supplier does not shut down the business.<\/p>\n<p><em>And back to the main event \u2026<\/em><\/p>\n<p><strong><u>Unsecure Supply Chains<\/u><\/strong><\/p>\n<p>There is a rise in malware being spread by BitTorrent, warez, legit website downloads, etc. The rise in BYOD and consumerisation of IT makes this a threat in the business. Users are downloading software outside of the traditional locked down administrator-driven controls, and they are bringing in malware. <\/p>\n<p>Win32\/Keygen is a common threat in this space, and the name gives away what it sells itself as \u2013 a quick way to activate software that you haven\u2019t bought or can\u2019t find a product key for: Photoshop, Nero, AutoCAD, Call of Duty, etc.&#160; Some \u201cAdobe Flash\u201d installers were also found with malware.&#160; These were non legit installers hosted on 3rd party sites; the user comes to a site that won\u2019t play and they\u2019re told to install an up to date version of Flash.&#160; They do, and their PC is owned, because that was not the official installer from the Adobe site.<\/p>\n<p>Contrary to many misconceptions, no malware can offer 100% protection anymore.&#160; There are just too many attacks, many of which go unreported for very long times thanks to the new zero-day black markets and their \u201croyalty for staying quiet\u201d payment schemes.&#160; The days of the teenager in the basement are over, and this stuff is very professional now, looking to steal confidential data and financial access.<\/p>\n<p>What can help is a well designed BYOD scheme with isolation.&#160; I like the App Catalog in ConfigMgr 2012.&#160; It gives the user the flexibility of BYOD but on a corporate machine.&#160; As for true, BYPD personally owned devices, you have to treat those as untrusted and not let them all the way in, in my opinion.&#160; Windows To Go is a nice touch, allowing the user to use their own device but they must use a Windows 8 image on a USB 3.0 storage device that is provided and managed by the business.<\/p>\n<p>This kind of malware is a real threat in BYOD deployments.&#160; Isolate those machines and only give them limited access to web apps via firewalls is my thinking.&#160; But I can see how that\u2019s not enough, e.g. key loggers.<\/p>\n<p>Microsoft has a few suggestions:<\/p>\n<ul>\n<li>Acceptable usage policies: sorry, but users are stupid (rule #1) and rules are made to be broken.&#160; We all know that IT only creates these policies to make life more intolerable anyway \u2013 that was sarcasm, by the way.&#160; Blocking and limited rights are the only way forward.<\/li>\n<li>Block P2P: That goes without saying for LAN\/Internet access but is a challenge for mobile computing, without expensive 3rd party software<\/li>\n<li>Procurement: Buy all hardware and image for the users \u2026 hmm<\/li>\n<li>Use AppLocker: Software Assurance required for this white listing solution on Windows 7\/8 Enterprise<\/li>\n<li>Use a 64-bit OS: Not a solution but it appears to limit success of attacks.<\/li>\n<\/ul>\n<p>Windows To Go or RDS\/Citrix seems like the solution for BYOD to me.&#160; Let them use the device of their choice, but not the OS\/data on that machine.<\/p>\n<p><strong><u>Disclosed Vulnerabilities<\/u><\/strong><\/p>\n<p>This refers to the number of industry revealed weaknesses in software.&#160; There had been a trend where this number was dropping from 2009 to 2011, but we see a rise in 2012, across low, medium, and high risk threats.&#160; 50% of threats in H1 2012 where medium and 31.5% were high risk.<\/p>\n<p>OS vulnerabilities have been dropping since 2010 and continue to do so.&#160; Browser vulnerabilities (industry wide) have been rising since 2009.&#160; Application (e.g. Flash and Java) have risen drastically in H1 2012.&#160; Note that the rise affects non-Microsoft products, while Microsoft vulnerabilities have been reducing in number since H2 2010 (down 56.1%).<\/p>\n<p><a href=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2012\/10\/image4.png\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; border-left: 0px; display: block; padding-right: 0px; margin-right: auto\" border=\"0\" alt=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2012\/10\/image_thumb4.png\" width=\"404\" height=\"254\" \/><\/a><\/p>\n<p><strong><u>Exploits<\/u><\/strong><\/p>\n<p>HTML\/Javascript (dropping in this period) and Java (rising since Q3 2011) lead the way, by a long shot.<\/p>\n<p><a href=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2012\/10\/image5.png\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; border-left: 0px; display: block; padding-right: 0px; margin-right: auto\" border=\"0\" alt=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2012\/10\/image_thumb5.png\" width=\"404\" height=\"242\" \/><\/a><\/p>\n<p>Java has made a lot of bad security headlines in recent months and you can see why this is a concern.&#160; This is compounded by Oracle\u2019s infrequent releases and their intransigence on this matter until the media as a whole said that Java needed to be turned off or removed.<\/p>\n<p>Documents were the number 3 type to be hit.&#160; Guess who cam in at number 1 with no one in the rear mirror?&#160; You guessed it: Adobe Reader and Acrobat.<\/p>\n<p>As for OS being attacked, Windows was the clear number 1, as it should be because it is on 95% of all PCs after all.&#160; Android is number 2.&#160; Apple are barely a spec on the market and were just bundled into the flat Others category.<\/p>\n<p>The number 1 most attacked vulnerability was the 2 year old (August 2010) <a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/MS10-046\" target=\"_blank\">MS10-46<\/a> (made famous by Stuxnet but Ramnit is the #1 threat [and rising]).&#160; <\/p>\n<p>Turns out that some of the jailbreak solutions for Android contain malware.&#160; Not too surprising, really.<\/p>\n<p><strong><u>Security Update Maintenance<\/u><\/strong><\/p>\n<p>No surprises here unfortunately:<\/p>\n<p><a href=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2012\/10\/image6.png\"><img loading=\"lazy\" decoding=\"async\" title=\"image\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; border-left: 0px; display: block; padding-right: 0px; margin-right: auto\" border=\"0\" alt=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2012\/10\/image_thumb6.png\" width=\"454\" height=\"120\" \/><\/a><\/p>\n<p>Windows is still not being updated.&#160; I still encounter reasonably large organisations that \u201cmanually\u201d approve patches.&#160; If you attend any presentation that I do that includes the topic of patching, then you know that manual approval is an oxymoron.&#160; These are usually the same people that have been hit by Conficker, etc, years after the patch to block it is released.&#160; That\u2019s professional negligence in my opinion, pure and simple.<\/p>\n<p>The lack of compliance for Adobe and Java is far some surprising.&#160; 28% percent of Adobe Reader users had not updated in 2 years.&#160; Adobe needs to do more to work with the OS vendors to get their products updated.&#160; And we all know that Java apps are usually written to run on a specific 5 year old version of the runtime, and that\u2019s usually government (taxation) or banking software \u2026 you know \u2026 the stuff that <em>needs<\/em> the best security?!?!?!<\/p>\n<p><strong><u>Geography<\/u><\/strong><\/p>\n<p>Infection rates (FakePav fake malware \u2013 detections up 45 times) went up by 32.6% in the USA during Q1 and Q2 of 2012.&#160; Similar with Korea (Pluzoks trojan).&#160; Chine has a slight increase and everyone else was down.&#160; <\/p>\n<p>Successful infection rates are rocketing in Korea.&#160; I mean <em>rocketing<\/em>.<\/p>\n<p><strong><u>Operating System<\/u><\/strong><\/p>\n<p>Windows XP SP3 leads the way.&#160; Windows 7 SP1 x86 is half of that rate, and the x64 is one third of it.&#160; Adware is dropping since Q1 2011 but Trojans are on the rise since Q2 2011.<\/p>\n<p><strong><u>Business Versus Home PCs<\/u><\/strong><\/p>\n<p>A Javascript threat called <a href=\"http:\/\/www.microsoft.com\/security\/portal\/Threat\/Encyclopedia\/Entry.aspx?Name=Trojan%3aJS%2fIframeRef\" target=\"_blank\">IframeRef<\/a> number one threat on domain-joined (business) PCs.&#160; Here is the bit that is the most sickening and annoying of all.&#160; Conficker is still the number 2 threat on business machines.&#160; Seriously!?!?!!?&#160; The patch (<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms08-067\" target=\"_blank\">MS08-067<\/a>) to prevent this was released in October 2008 \u2026 4 frakking years ago!&#160; Why the hell are businesses not patching?&#160; The tools have been freely available since \u2026 jeez 2003 or something when SUS was released!?!?!&#160; There is absolutely no legitimate excuse for this \u2026 don\u2019t bother posting any lame excuses you might have to excuse your lack of professionalism if this applies to you; you\u2019ll only highlight you own deficiencies for the world to see.<\/p>\n<p>On the home side, Conficker is <em>not<\/em> in the top 10.&#160; KeyGen is the #1 and Autorun is #2.<\/p>\n<p><strong><u>Phishing Sites <\/u><\/strong><\/p>\n<p>Remember I said these guys want to steal money?&#160; All categories (including social media) are down, except for financial phishing (fake emails from your bank saying you need to log in to a dodgy site) are on the increase in Q2 2012.&#160; USA, Ireland, China, east Africa, south Gulf, and southeast Asia are all hotspots for this activity.<\/p>\n<p>Go have a read of the <a href=\"http:\/\/download.microsoft.com\/download\/C\/1\/F\/C1F6A2B2-F45F-45F7-B788-32D2CCA48D29\/Microsoft_Security_Intelligence_Report_Volume_13_English.pdf\" target=\"_blank\">document<\/a> for yourself, especially if you are involved in the decision making of IT security or engineering in your site or those of your customers.&#160; It\u2019s useful to see what\u2019s going on right now so you can plan accordingly.<\/p>\n<div id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:95f59f50-493b-4439-8e7f-6e2fe59ac1ff\" class=\"wlWriterEditableSmartContent\" style=\"float: none; padding-bottom: 0px; padding-top: 0px; padding-left: 0px; margin: 0px; display: inline; padding-right: 0px\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/Security\" rel=\"tag\">Security<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Volume 13 (Jan-June 2012) of the Microsoft SIR has been released.&#160; Last year I read the same one, and Conficker was still the number 1 malware on domain-joined computers.&#160; What nuggets are there this year? Before we get there \u2026 I heard of another report (Symantec I think) that a new kind of attack is &hellip; <a href=\"https:\/\/aidanfinn.com\/?p=13611\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Microsoft Security Intelligence Report \u2013 H1 2012&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[37],"tags":[190],"class_list":["post-13611","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"aioseo_notices":[],"jetpack_featured_media_url":"","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/13611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13611"}],"version-history":[{"count":0,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/13611\/revisions"}],"wp:attachment":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}