MS Security Report Jul-Dec06
MS Security Report Jul-Dec06
The information contained in this document represents the current view of Microsoft Corporation
on the issues discussed as of the date of publication. Because Microsoft must respond to changing
market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and
Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES,
EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced
into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission
of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
Contributors
Chuck Bassett Yuhui Huang
Microsoft Forefront Client Security Microsoft Security Research & Response
Dave Berkowitz Aaron Hulett
Trustworthy Computing Microsoft Security Research & Response
Subratam Biswas Jonathan Keller
Microsoft Security Research & Response Microsoft Security Research & Response
Daniel Bohm David Kennedy
Exchange Hosted Services (EHS) Microsoft Legal and Corporate Affairs
Matthew Braverman Jimmy Kuo
Microsoft Security Research & Response Microsoft Security Research & Response
Christopher Budd Mady Marinescu
Trustworthy Computing Microsoft Security Research & Response
Alexandru Carp Charles McColgan
Microsoft Security Research & Response Exchange Hosted Services (EHS)
Doug Cavit Mark Miller
Trustworthy Computing Trustworthy Computing
Brendan Foley Michael Mitchell
Microsoft Security and Access Product Marketing Microsoft Legal and Corporate Affairs
Jason Garms Gina Narkunas
Windows Engineering Microsoft Online Services Group
Jason Geffner Adam Overton
Microsoft Security Research & Response Microsoft Security Research & Response
Kjersti Gunderson Tim Rains
Waggener Edstrom Trustworthy Computing
Jim Hahn Bo Rohlfsen
Windows Client Windows Live OneCare
Brett Harris Stephen Toulouse
Microsoft Security Research & Response Trustworthy Computing
Richard Harrison Pat Winkler
Content Master Microsoft Security Research & Response
Rob Hensing Jaime Wong
Microsoft Security Technology Unit Microsoft Security Research & Response
Microsof t Security Intelligence Repor t
Table of Contents
vi
Reporting Period
This Security Intelligence Report contains data and trends observed over the past several
years, but focuses on the second half of 2006 [2H06]. The nomenclature used throughout
the report to refer to different reporting periods is nHYY, where nH refers to either the first
(1) or second (2) half of the year, and YY denotes the year. For example, 1H06 represents
the period covering the first half of 2006 (January 1 through June 30), while 2H05
represents the period covering the second half of 2005 (July 1 through December 31).
Data Sources
Software Vulnerabilities
The efforts to identify and fix vulnerabilities lacked a common naming mechanism until
a consortium led by The Mitre Corporation began publishing the Common Vulnerabilities
and Exposure (CVE) list, which drives a common naming mechanism that can be
leveraged by multiple vulnerability databases and security products. The CVE naming
conventions provide the most comprehensive list of vulnerabilities worldwide, across
software products of all types. This report uses the CVE naming conventions when
identifying individual vulnerabilities.
Microsof t Security Intelligence Repor t
The analysis in this report uses a set of data that has been created by compiling,
customizing, and cross-checking several sources of data available on the Internet:
■ Common Vulnerabilities and Exposures Web site (http://cve.mitre.org).
A large portion of the data analyzed originates from the CVE list maintained
at this site, which is currently sponsored by the United States Department of
Homeland Security (DHS). The naming mechanisms and external references
to sources for additional information were particularly valuable.
■ National Vulnerability Database (NVD) Web site (http://nvd.nist.gov/).
This database superset of the CVE list, which provides additional objective
information concerning vulnerabilities, was the source used to determine
severity ratings and to exploit complexity assessment. The NVD is also
sponsored by the United States DHS, and their data is downloadable in an
XML format at http://nvd.nist.gov/download.cfm.
■ Security Web sites. The following sites, as well as many others, were
utilized for detailed verification and validation of vulnerability specifics:
■ http://www.securityfocus.com
■ http://www.securityfocus.com/archive/1 (Bugtraq mailing list)
■ http://www.secunia.com
■ http://www.securitytracker.com
■ Vendor Web sites and support sites. The following sites, as well as others,
were utilized for confirmation and validation of vulnerability details:
■ https://rhn.redhat.com/errata
■ http://support.novell.com/linux/psdb
■ http://sunsolve.sun.com
■ http://www.microsoft.com/technet/security/current.aspx
■ http://www.ubuntu.com/usn
By leveraging these sources, as well as many others, Microsoft has compiled a database
of disclosure dates for vulnerabilities that can be used to determine the year, month, and
day that each vulnerability was disclosed publicly and broadly for the first time.
Note that, in this report, “disclosure” is used to mean broad and public disclosure, and not
any sort of private disclosure or disclosure to a limited number of people.
Microsof t Security Intelligence Repor t
Available Main
Spyware and Potentially at No Distribution
Product Name Main Customer Segment Malicious Software Unwanted Software Additional Methods
Prevalent
Windows Malicious WU / AU,
Malware
Software Removal Tool Download Center
Families
Download Center
Windows Defender
Windows Vista
Web / Store
Windows Live OneCare
Purchase
Microsoft Exchange
Web
Hosted Filtering
1
Neither the MSRT nor Windows Defender intentionally collects personally identifiable information (PII). The Windows Defender privacy
policy states that Windows Defender may unintentionally compile reports that contain personal information from file paths and partial
memory dumps from users who have joined SpyNet as Advanced members. For more information on the type of data these products collect,
see the Windows Defender privacy policy at http://www.microsoft.com/athome/security/spyware/software/privacypolicy.mspx and the MSRT
online documentation at http://support.microsoft.com/kb/890830.
Microsof t Security Intelligence Repor t
Executive Foreword
Five years ago, Microsoft made a commitment to dramatically shift the company’s
mission and strategy by infusing Trustworthy Computing (TwC) into everything we do—
focusing on making our products and services more secure and reliable, protecting our
customers’ privacy, and being more transparent and responsive in our business practices.
Our first step was to increase the quality of our products. We put a lot of effort into
understanding what “security assurance” truly means and applying this learning to
our products. This resulted in one of our most important innovations—the Security
Development Life Cycle (SDL). The SDL provides concrete, actionable steps that each
member involved in the software development effort can use to understand, target, and
measure the security of their product. The SDL and other engineering practices have
greatly increased the security quality of our products, and as part of our commitment to
the overall software ecosystem, we have started the process of sharing these tools with
partners and the research community in general.
However, due to the complexity of contemporary software and ongoing vulnerability
research, we must focus not only on finding and fixing specific security issues, but also
on building in-depth defense mechanisms to improve our product resiliency. The Address
Space Layout Randomization (ASLR) feature and Data Execution Prevention (NX)
improvements that we built into Windows Vista are examples of such mechanisms, as
they do not address specific coding issues, but do help make it more difficult to write
automated attacks by making each Windows machine look different to an attacker.
We also continue to invest in security science to address classes of issues and raise the
bar for creating exploits.
Our experience over the last five years has also taught us many things about how we
share information. First and foremost, we have learned that transparency is the key to
enabling our customers to respond to security issues in a proportionate and deliberate
way. Transparency is also critical in our participation in the security research community,
as it demonstrates our commitment to the shared goal of keeping customers truly
protected. During this time, we’ve been proud to be part of the emerging security
community, participating as a member, creating strong partnerships, and sharing our
knowledge and continued innovation.
As part of our mission to provide transparency, this Security Intelligence Report contains
our analysis of new security vulnerabilities disclosed during the 2006 calendar year.
We also compare some trending information for vulnerabilities over the past several
years, but with a particular focus on trends that might be emerging over the past 12 to
24 months. Our goal is to enable our customers to make the right decisions for their
needs, based on accurate and trustworthy data.
Microsof t Security Intelligence Repor t
As long as threats to our customers exist, we will stay vigilant and respond with
our customers’ best interests at heart. We will continue to improve our development
processes, our products and services, our industry partnerships, and our response
processes, in order to continue to meet our TwC vision.
Sincerely,
George Stathakopoulos
General Manager of Product Security
Microsoft Corporation
Executive Summary
This report provides an in-depth perspective of the software vulnerability, malicious
software, and potentially unwanted software landscapes. The lists below summarize the
key points from each section of the report.
Note On November 30, 2006, Microsoft Windows Vista was made available to business
customers with volume license agreements. Windows Vista became generally available
on January 30, 2007. Although this report does make reference to Windows Vista, a
full analysis of relevant data from Windows Vista will be included in a future version of
this report.
Figure 2. Annual
vulnerability disclosures Vulnerability Disclosures
7,000
6,000 6,566
5,000
4,647
4,000
3,000
2,000 2,573
2,104
1,000 1,528
1,190 1,213
0
2000 2001 2002 2003 2004 2005 2006
Microsof t Security Intelligence Repor t
Figure 3. Disclosures
2006 - Disclosures by Month by month for 2006
700
600
500
400
300
200
100
0
Figure 4. Disclosures
2006 - Disclosures by Week by week during 2006
200
180
160
140
120
100
80
60
40
20
0
1 6 11 16 21 26 31 36 41 46 51
Microsof t Security Intelligence Repor t
10
Looking at the weekly disclosures in Figure 4 and the average disclosures per week for
2000 through 2005 in Figure 5, the first week of the year consistently shows very few
vulnerability disclosures.
Figure 5. Average
2000-2005 Average Disclosures by Week
disclosures by week
for 2000–2005 80
70
60
50
40
30
20
10
0
1 6 11 16 21 26 31 36 41 46 51
Figure 6. Disclosure by
day of the week in 2006
2006 - Disclosures by Day of Week
1,600
1,400
1,493
1,200 1,299
1,000 1,149
1,056
800 931
600
400
399
200 276
0
In either case, however, the data indicates that public disclosures tend to happen during
the work week, with 90 percent of all disclosures being published Monday through
Friday, from 2000 through 2005. These figures are displayed in Figure 7.
Microsof t Security Intelligence Repor t
11
With Tuesday identified as the most likely day for disclosures to happen, one must
consider if this is a result of the so-called “Patch Tuesday,” which is the day each month
that Microsoft issues Security Bulletins. While this Microsoft policy clearly adds to the
total Tuesday disclosures, the answer is no. There were 141 Tuesday disclosures for
vulnerabilities affecting Microsoft products in 2006. If this amount is reduced out of the
Tuesday disclosure count, Tuesday is still the top day for disclosures during 2006.
Figure 7. Average
2000-2005 Average Disclosure by Day of Week disclosures by day of
the week for 2000–2005
450
400 439
411 421
350
357
300
311
250
200
150
100 140
50 90
0
12
Figure 8 shows that while the growth of Low severity issues appears to be flattening, Medium
and High severity vulnerabilities both experienced significant growth in recent periods.
Figure 8. Vulnerabilities
by severity Vulnerabilities by Severity
7,000
6,000
5,000
4,000
3,000
2,000
1,000
0
2000 2001 2002 2003 2004 2005 2006
Figure 9 shows a slightly different view of severity. In charting the vulnerabilities by per
centage, it appears that Medium severity issues are being identified and disclosed much more
aggressively. For 2006, Low severity issues as a percentage decreased by nearly 10 percent
from the previous year, while High severity issues remained flat relative to the total.
Figure 9. Severities as
a percentage of total Vulnerabilities by Severity Percentage
vulnerabilities
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
2000 2001 2002 2003 2004 2005 2006
13
Complexity to Exploit
Another interesting way to characterize software vulnerabilities is by the level of com
plexity that a potential attack would require in order to exploit them. For purposes of
complexity analysis, this report uses the NVD complexity ratings of Complex or Easy
(to exploit). Additional information about these ratings is available at http://nvd.nist.gov/.
In the previous section, we observed that improvements in tools and techniques, and the
maturing security vulnerability research industry, have resulted in increased disclosure
of harder-to-find, lesser-impact vulnerabilities. This is reinforced by the complexity
breakdown as shown in Figure 10. In previous periods, highly complex exploits were
required for less than 5 percent of vulnerabilities disclosed. However, the trend has been
upwards for the past few years, and in 2006, complex to exploit vulnerabilities jumped to
more than 15 percent of the yearly total.
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
2000 2001 2002 2003 2004 2005 2006
Complex Easy
Microsof t Security Intelligence Repor t
14
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
2000 2001 2002 2003 2004 2005 2006
One possible interpretation of this trend is that security researchers are focusing more on
applications as operating system security continues to improve. An alternate explanation
could be that the number of new applications is growing far faster than the number of
new operating systems and that the application proliferation is simply reflected in the
vulnerability disclosure trend.
15
Malicious Software
This section discusses the emergence of new malware variants and the prevalence of
malicious software during 2H06. Notably, the emergence of new, potentially unwanted
software variants is discussed in the “Potentially Unwanted Software” section.
Malware that copies itself to file shares that are associated with
P2P worm peer-to-peer (P2P) applications, such as KaZaA and Winny, to
facilitate its spread over those networks.
Malware that infects other files in the system, thus allowing the
Virus execution of the malware code and its propagation when those
files are activated.
Microsof t Security Intelligence Repor t
16
Although the category descriptions have been refined for this report, they are
consistent with those defined in the 1H06 version of this document 1. These category
descriptions are also consistent with those found in the white paper MSRT: Progress
Made, Lessons Learned 2.
These categories are not mutually exclusive—one malware variant or family might
fit into several of the categories. For example, backdoor Trojans, password stealers,
keyloggers, Trojan downloaders, and Trojan droppers are all different types of Trojans
that have specific functionality, as implied from their names. The classification of families
to malware types uses a rule where the most relevant type applies. Malware families that
include Trojan functionality, but do not include any of the specific Trojan behaviors that
are listed above, were classified using the general Trojan category.
Prevalence by Variants
The number of malware variants remained steady throughout the second half of 2006,
with backdoor Trojans—in particular, bots—remaining the most active category. On
average, the Microsoft Security Research & Response team analyzed more than 7,000
unique backdoor Trojan variants each month, and approximately
4,500 of those were variants of bots.
“The number of password stealer The number of password stealer and keylogger variants associated
and keylogger variants associated with the Win32/Banker and Win32/Bancos families generally
with the Win32/Banker and Win32/ decreased from 1H06 to 2H06. However, both families remain
Bancos families generally decreased active in Brazil and other Portuguese-speaking countries. The
from 1H06 to 2H06.” Win32/Banker family was added to the Windows Malicious
Software Removal Tool (MSRT) in August 2006, followed closely
by the Win32/Bancos family in September 2006.
Conversely, the number of Trojan downloaders/droppers increased in the second half of
2006. One new and particularly active family was Win32/Stration, a family of Trojan
1
The previous Microsoft Security Intelligence Report can be downloaded from the Microsoft Download Center
(http://go.microsoft.com/?linkid=6543860.)
2
This white paper can be downloaded from the Microsoft Download Center (http://go.microsoft.com/fwlink/?linkid=67998).
Microsof t Security Intelligence Repor t
17
downloaders and mass-mailing worms that first gained momentum in September 2006.
Win32/Stration uses many different variants of downloaders to get files from remote Web
sites, which in many cases are new variants of the Win32/Stration e-mail worm. Nearly
5,000 unique Win32/Stration downloader variants were discovered in the fourth quarter
of 2006 alone. Another notable downloader family was the Win32/Zlob family, which
spawned nearly 2,900 variants in 2H06.
Along with increases in backdoor Trojans and Trojan downloaders/droppers, there were
Figure 13. Malicious
also increases in the activity of traditional Trojans and mass-mailing worms, as shown
software activity during
in Figure 13. 1H06 and 2H06
50,000
45,000
40,000
35,000
New variants
30,000
25,000
1H06
20,000
2H06
15,000
10,000
5,000
0
18
The most significant additions to the 2H06 25 most-active families list were the Win32/
Stration mass-mailing worms and the Trojan downloaders family. Six of the top active
Figure 14. Top 25 most
active malware families
families were bots. Many of the families appearing on the 2H06 report were carry-overs
during 2H06 from the 1H06 report, signifying a continuing prevalence of these threats.
Number of
PWS / Key Downloader / variants
Rank Malware Family Mail P2P IM Exploit Backdoor Rootkit Virus logger Dropper Trojan (2H06)
1 Win32/Rbot 15,195
2 Win32/Banker 8,955
3 Win32/Hupigon 8,544
4 Win32/Stration 7,871
5 Win32/Sdbot 6,892
6 Win32/Small 3,115
7 Win32/Mmosteal 3,078
8 Win32/Zlob 2,873
9 Win32/Bancos 2,817
10 Win32/Gaobot 2,710
11 Win32/Tibs 2,483
12 Win32/Spybot 2,264
13 Win32/VB 2,167
14 Win32/Agent 1,803
15 Win32/Harnig 1,744
16 Win32/Lineage 1,676
17 Win32/Delf 1,589
18 Win32/Adload 1,021
19 Win32/Inservice 803
20 Win32/IRCbot 803
21 Win32/Sinowal 731
22 Win32/Mytob 727
23 Win32/Adialer 571
24 Win32/Bifrose 495
25 Win32/Startpage 433
Microsof t Security Intelligence Repor t
19
Over 3,700 distinct malicious WMF files exploiting the MS06-001 vulnerability were
discovered during the second half of 2006. This continued prevalence demonstrates
that, despite the availability of a security update, attackers continue to attempt to exploit
this particular vulnerability. Nevertheless, the effectiveness of these attacks was greatly
reduced during 2H06.
1,000
800
600
400
200
0
July 06 Aug 06 Sept 06 Oct 06 Nov 06 Dec 06
20
Figure 16 shows some examples of the additional generic exploit detections that were
added to real-time protection during 2006.
Figure 16. Examples CVE ID Security Update Microsoft Generic Detection Name Added On
of generic exploit
detections added CVE-2006-3649 MS06-047 Exploit:Win32/Ponaml.gen Jun 06
during 2006 CVE-2006-3059 MS06-037 Exploit:Win32/Exllobj.gen Jun 06
Of the generic exploit detections that were added to exploits in other products, Exploit:
JS/SetSlice, which addresses exploits of Windows vulnerability MS06-057, eventually
became the fourth-most-detected malware by Windows Live OneCare.
Prevalence by Infection
The Microsoft Windows Malicious Software Removal Tool (MSRT) is designed to help
identify and remove prevalent malware from customer computers and is available at no
charge to licensed Windows users. Beginning in 2H05, the MSRT began measuring the
number of unique computers cleaned. Since then, the MSRT has removed 31 million
infections from 11.7 million computers worldwide. The number of executions has
more than tripled since the first release of the tool and so has the
number of disinfections. The moderate increase in the number
“ The Microsoft Windows Malicious of disinfections in 2H06 compared to 1H06 is the result of a
Software Removal Tool (MSRT) is combination of disinfections of active malware families that
designed to help identify and remove were added to the MSRT during 2H06, along with the decreasing
prevalent malware from customer prevalence of most of those families, which were already removed
computers and is available at no by the tool.
charge to licensed Windows users.”
Microsof t Security Intelligence Repor t
21
The number of malware disinfections and computers cleaned by the MSRT are depicted
in Figure 17.
12,000,000
10,000,000
8,000,000
2,000,000
0
1H05 2H05 1H06 2H06
Time Period
The MSRT is primarily released through Windows Update (WU), Microsoft Update (MU),
and Automatic Updates (AU). A version of the tool is also available for download from
the Microsoft Download Center. As of December 2006, the tool is capable of detecting
and removing 82 different malware families. Notably, the tool does not target potentially
unwanted software. The MSRT is also not a replacement for an up-to-date antivirus
solution because of its lack of real-time protection and also because it uses only the
portion of the Microsoft antivirus signature database that enables it to target prevalent
malicious software.
Bots and Backdoor Trojans
Bots are used in botnets, which are groups of infected computers that are controlled by
attackers, usually by using IRC channels. Bots remained the most active type of malware
in 2H06, but in terms of prevalence, both bots and backdoor Trojans continued to decline
throughout 2H06. Of computers in which the MSRT detected any malware during the
period, detections of bots and backdoor Trojans declined from 68 percent in 2H05, to
50 percent in 1H06, to 43 percent in 2H06. Viewed as absolute numbers, the decrease
appears more moderate—from 2.2 million backdoor Trojan detections in 2H05, to
2.0 million in 1H06, to 1.94 million detections in 2H06.
Microsof t Security Intelligence Repor t
22
The increase in the number of Trojan downloaders and droppers in 2H06 is not sur
prising. Malware often includes Trojan downloader and dropper components as part
of the process it uses to infect a computer and take control over it. For example, the
active Win32/Stration, Win32/Zlob, and Win32/Tibs malware families all include
Trojan downloader or dropper components. Variants of Win32/Zlob were removed from
360,000 computers during 2H06.
Password Stealers and Keyloggers
23
Figure 18 illustrates the categories of malicious software that were removed by the MSRT
from infected computers in 2H05, 1H06, and 2H06. Malware categories are ordered by
infection percentages by 2H05, 1H06, and 2H06, respectively. Note that these percentages
correspond to infected computers, not to all computers scanned. For example, in 2H05, Figure 18. Categories
of the 3.2 million unique computers cleaned, approximately 2.2 million (or 68 percent) of of malware removed by
the MSRT during 2H05,
these computers had some type of backdoor Trojan active on the system. 1H06, and 2H06
70%
60%
50%
2H05
40%
1H06
30%
% of Infected Computers 2H06
20%
10%
0%
Malware Category
Note that while Figure 18 shows a lower number of exploit detections by the MSRT
during the second half of 2006, this number may be misleading, as there was actually an
increase in the use of exploits during that period (as shown in the following section). The
execution time of most of these exploits is short, and as a result, they are not included in
the MSRT.
Windows Live OneCare
There were no significant changes in the type of malware that Windows Live OneCare
and the Windows Live OneCare safety scanner detected in 2H06 compared to 1H06.
Trojan downloaders and droppers remain the most common type of malware to be
blocked and cleaned. The detection rate in Figure 19 is higher than the one shown in
Figure 18 (MSRT) because the MSRT uses only a partial signature set. MSRT detects
families that are resident in memory during its short scanning time and therefore does not
include detection for many of the downloaders.
The high detection rate of exploits found by Windows Live OneCare is a result of
the addition of a list of generic exploits detections during 2H06. For example, in
October 2006, detection for Exploit:JS/SetSlice was added to Windows Live OneCare
to block exploits of the vulnerability discussed in security update MS06-057. The safety
scanner detected these exploits over 2,200 times during the second half of 2006. But while
Microsof t Security Intelligence Repor t
24
attackers continued to release large numbers of malicious WMF files (over 3,700 files
detected in 2H06), the number of detections of WMF exploits by Windows Live OneCare
in 2H06 actually decreased by 63 percent compared to the corresponding number in 1H06.
This demonstrates that this attack technique was not as effective as in the previous period,
likely due to increased deployment of the security update for this vulnerability (MS06-001),
as well as improved detection by different antivirus programs.
Figure 19 shows the categories of malicious software removed by Windows Live
OneCare safety scanner and Windows Live OneCare, using the same categories as shown
in Figure 18 for the MSRT. The data for Windows Live OneCare is divided into two
subsets, one showing malicious software that is blocked by the scanner’s on-access/real-
time mechanism, and the other showing malicious software that is found on the computer
and then removed (cleaned). This makes it easier to compare the Windows Live OneCare
Figure 19. Types of data to the Windows Live OneCare safety scanner data because the Windows Live
malware removed or
blocked by the Windows OneCare safety scanner does not block malicious software from infecting a computer.
Live OneCare safety
scanner and Windows
Note that the percentage of all the types is higher than 100 percent because some of the
Live OneCare in 2H06 malware families are multi-component and correspond to more than one malware type.
60%
50%
40%
30%
% of Infected Computers
Safety Scanner - Cleaned
20%
OneCare - Blocked
0%
25
60%
50%
40%
0%
26
Figure 21 also shows the percentage change in the number of computers cleaned for each
Figure 21. Top 25 malicious family since the previous six-month period (1H06). To ensure accuracy,
malicious families
rankings from the last period are included only for those families that were included in
cleaned by the MSRT
during 2H06 the tool since the beginning of the last six-month period, in January 2006.
Computers Cleaned
Rank Malware Family Disinfections Computers Cleaned Change Since 1H06 Rank from 1H06
1 Win32/Rbot 1,531,448 812,543 -33.19% 1
2 Win32/Hupigon 1,448,185 634,356 -
3 Win32/Parite 1,189,599 508,886 -13.54% 2
4 Win32/Wukill 701,749 384,316 1.59% 4
5 Win32/Jeefo 946,929 384,235 -
6 Win32/Alcan 598,537 362,474 -29.60% 3
7 Win32/Zlob 872,614 359,596 265.41% 10
8 Win32/Banker 579,904 304,343 -
9 Win32/Brontok 460,672 282,042 -
10 Win32/Sdbot 347,022 205,877 -41.40% 5
11 Win32/Sinowal 442,656 156,185 -
12 Win32/Bancos 153,464 91,690 -
13 Win32/IRCbot 127,664 82,002 29.83% 16
14 Win32/Tibs 193,178 75,613 -
15 Win32/Netsky 94,015 57,882 -32.89% 13
16 Win32/Mywife 158,993 53,603 -54.89% 8
17 Win32/Chir 82,567 51,112 -
18 WinNT/FURootkit 87,283 48,724 -68.27% 6
19 WinNT/F4IRootkit 60,793 40,848 -64.97% 9
20 Win32/Spybot 59,920 38,494 -45.01% 15
21 Win32/Bagle 79,812 37,639 -70.28% 7
22 Win32/Alemod 91,151 34,069 -
23 Win32/Beenut 39,960 33,831 -
24 Win32/Gaobot 70,184 33,702 -61.67% 12
25 Win32/Antinny 104,192 32,301 -54.78% 14
Some of the families that were added to the detection and cleaning capabilities of the
MSRT turned out to be fairly prevalent. Over 8,500 variants of Win32/Hupigon were
removed from 634,000 computers during 2H06. Equally prolific, the Win32/Jeefo,
Win32/Alcan, Win32/Zlob, and Win32/Banker families were each removed from over
300,000 computers during the same period. Note that Win32/Banker and Win32/Jeefo
were added to the MSRT in August 2006; therefore their average monthly removal
numbers are even higher than the other two families, which were added to the MSRT
during the first half of 2006.
Top Malicious Programs Cleaned
Figures 22, 23, and 24 list the top malicious software programs detected by Windows
Live OneCare and the Windows Live OneCare safety scanner during 1H06 and 2H06,
ranked by the number of unique computers on which each malware family was detected.
Microsof t Security Intelligence Repor t
27
While there is some overlap in the malware blocked by Windows Live OneCare (on-
access detection) and the malware that gets cleaned (on-demand access), there are also
great dissimilarities. For example, the on-demand scan often finds malicious Java applets
Microsof t Security Intelligence Repor t
28
in the Internet Cache folder (reflected in Figure 23). While users surf the Web, they may
access HTML pages that download or drop ZIP files with these JAVA applets included.
During the on-demand scan, these HTML pages and applets get detected and cleaned.
On the other hand, exploit detections happen more rarely during on-demand scans
because these detections are effective in blocking the access to these files.
Predictably, the type of malware found by Windows Live OneCare safety scanner is
very similar to what is found during on-demand scans of Windows Live OneCare.
Both methods involve scans of large portions of the computer’s hard drive. The only
major changes that reflect differences between the two are the drop in the rank of the
Microsof t Security Intelligence Repor t
29
WMF exploit detection and the jump in the rank of the Win32/Zlob, both trends already
discussed previously in this report.
30
During 2H06, 91.4 percent of the MSRT executions through Windows Update/
Automatic Update (WU/AU) were on computers running Windows XP SP2, compared
to 1.1 percent for computers running Windows XP and 2.2 percent for computers running
Windows XP SP1.
The chart data in Figure 25 has been normalized to accurately reflect executions on the
specific operating system (OS). The normalization formula used is as follows:
Normalized disinfectionsOS = DisinfectionsOS / Execution percentageOS
Applying this formula to the figures for 1H06 and 2H06 yields the 1H06 (normalized)
and 2H06 (normalized) charts in Figure 25, which depict percentages of computers
cleaned by the MSRT by operating system.
The normalized charts help with understanding which operating system versions are more
likely to be infected with malware. After normalization, the Windows XP SP2 infection
rate in 2H06 was 4.9 percent, while the Windows XP Gold version
(released with no service packs) infection rate was 36.9 percent.
This means that the likelihood of the MSRT finding malware on a
“ …Social engineering can trick the
Windows XP Gold version computer is 7.5 times higher than the
user into installing malicious software
likelihood of the MSRT finding malware on a Windows XP SP2
regardless of security updating.” computer, and in general, the higher the service pack level is, the
less likely the MSRT is to find malware on a computer. This ratio
between the infection rates of Windows XP and Windows XP SP2
is actually lower than it was in 1H06. This is due to the higher proportional detection of
malware families that rely on social engineering, as social engineering can trick the user
into installing malicious software regardless of security updating.
Microsof t Security Intelligence Repor t
31
2H06
1H06
Windows Windows Windows Windows XP
Windows Windows Windows 2003 SP1 2000 SP3 2000 SP4 Gold
2003 Gold 2003 SP1 2000 SP3 Windows 0.6% 0.3% 5.8% 6.8%
0.1% 0.5% 0.6% 2000 SP4
9.8% Windows
Windows XP SP1
2003 Gold
8.7%
Windows XP 0.1%
Gold
11.5%
Windows XP
SP1
14.0%
Windows XP SP2
Windows XP SP2
63.4%
77.8%
1H06 (Normalized)
2H06 (Normalized)
Windows Windows Windows Windows Windows 2003 Windows 2003 Windows 2000
2003 Gold 2003 SP1 2000 SP3 2000 SP4 Gold SP1 SP3
5.3% 2.6% 17.0% 8.3% Windows 6.1% 2.8% 18.0%
XP SP2 Windows 2000
Windows XP SP4
4.9%
SP2 8.7%
3.7%
Windows XP Windows XP
SP1 Gold Windows XP Windows XP
23.9% 39.2% SP1 Gold
22.7% 36.9%
Microsof t Security Intelligence Repor t
32
Prevalence by Locale
The MSRT is available in 24 different languages. The data in Figure 26 compares the top
15 of those languages by operating system locale (or language) for computers that have been
cleaned by the MSRT in 1H06 and 2H06. Therefore, note that locale is not necessarily
indicative of geographical location. For example, installation of operating systems using
the English (U.S.) locale is fairly popular in other countries around the world.
The first two charts in Figure 26 show that a high percentage of the computers cleaned
have an English language operating system. This metric is deceptive because, as noted
above, it can be expected that a large number of the computers on which the MSRT is
run have an English language operating system installed. To take this into account, the
computers cleaned can be normalized by the execution percentage of a locale, similar to
the normalization of operating system use performed for Figure 25.
The normalization formula used is as follows:
Normalized disinfectionsLocale = DisinfectionsLocale / Execution PercentageLocale
The result of this normalization is shown in the 1H06 (normalized) chart in Figure 26,
in which the normalization process has distributed the disinfections more equally across
most locales. In other words, when the values are normalized, the removal of all malware
by the MSRT is spread across all Windows locales, including English.
Data Highlights
Using the normalized data, the Turkish version of Windows tends to be more consistently
infected with the malware families than any other Windows locale. The two Portuguese
versions of Windows were second and fourth in the number of MSRT detections among
the different Windows locales. This is a result of the prevalence of password stealers
and keyloggers associated with the Win32/Banker and Win32/Bancos families, which
were added to the MSRT in August 2006 and September 2006. These two families
predominantly use the Portuguese language to target users of Brazilian banks.
The MSRT also found proportionally more malware on the Chinese and Russian versions
of Windows. This may be a result of the increased activity of malware authors in those
countries or perhaps because of different levels of deployment of security products, such
as antivirus products, in different regions around the world.
Other countries, such as Japan, became less infected with malware compared to the first
half of the year. For example, the number of Japanese computers that were cleaned had
decreased by 30 percent. This result can be attributed to the 55-percent decrease in the
number of detections of the Win32/Antinny worm, which has spread almost exclusively
in Japan.
Microsof t Security Intelligence Repor t
33
Korean
7%
Swedish
1% Japanese
5%
Russian
1%
Italian Dutch Other Turkish French German Spanish (Spain)
Polish 2% 4% 4% 5%
2% 2% 4%
1%
Portuguese (Brazil) Chinese
1% (Traditional)
2%
2H06
Chinese (Simplified)
24%
English (U.S.)
Korean
32%
7%
Spanish
(Spain)
6%
Portuguese
(Brazil)
6%
34
Turkish Chinese
16% (Simplified)
7%
Other
22%
Korean
7%
Polish
5%
Spanish
(Spain)
5%
Danish
3%
English (U.S.)
4%
Italian
3%
2H06 (Normalized)
English (U.S.)
3%
French
3%
Portuguese
Hungarian
(Brazil)
4%
11%
Chinese
(Traditional)
4%
Polish
5% Chinese (Simplified)
8%
35
350,000,000
300,000,000
250,000,000
Infected Messages
200,000,000
150,000,000
100,000,000
50,000,000
0
1H06 2H06
Microsof t Security Intelligence Repor t
36
During 2006, the number of scanned mails increased by 162 percent, which means that
the percentage of infected e-mail actually went down. Figure 28 shows the percentage
of infected e-mail relative to the scanned traffic.
2.50%
2.00%
% Infected
1.50%
Messages
1.00%
0.50%
0.00%
1H06 2H06
This downward trend is further emphasized when looking at monthly data (Figure 29).
January 2006 showed a 9.4-percent rate of infected e-mail (during the period that marked
the end of the Win32/Sober.Z outbreak), so it was not included to allow easier observation
of the trend. This trend is surprising given the several e-mail-based outbreaks in 2006
caused by malware families, such as Win32/Stration. The trend might be explained by
the fact that EHS uses additional filtering phases before it applies its virus filtering. Also,
this shows again that there is not always a clear correlation between the prevalence of
infected e-mail and infected computers.
0.50%
0.40%
% Infected Messages
0.30%
0.20%
0.10%
0.00%
Microsof t Security Intelligence Repor t
37
Figure 30 lists the outbreaks detected by EHS with over 1 million infected mails in one
month per malware threat. The percentages were calculated by summing up the detection
numbers for variants from the same malware family from the top 10 detections for every
month and then calculating the percentage by dividing by the total number of infected
mails during that month. As already discussed, the Win32/Sober worm sent an unusually
high number of e-mail towards the end of 2H05 and January 2006, and then stopped.
Additionally, years-old mass-mailer worms, such as Win32/Netsky, Win32/Mytob, and
Win32/Bagle, still continue to spread by e-mail. However, along with these old families,
year 2006 has also brought the new prolific mass mailers Win32/Tibs and Win32/Stration,
both of which emerged during the last quarter of the year. Detections for phishing e-mail
were also high, accounting for up to 30 percent of all infected e-mail detected by EHS.
38
39
40
Figure 31 lists the top 25 programs detected by Windows Defender, ranked by percentile,
according to the number of instances of removal at the time that the potentially unwanted
software was identified.
Figure 31. Top 25 During this period, the top 25 software programs (selected by number of detections
software programs
and subsequently ranked in Figure 31 by frequency of removals) account for more than
detected by Windows
Defender for 2H06 . 56 percent of all removals among thousands of families of potentially unwanted software
Note: An entry marked that Windows Defender can detect and remove.
with an asterisk (*)
represents a new entry
into the top 25.
Microsof t Security Intelligence Repor t
41
While many of the programs identified by Windows Defender are clearly unwanted by
a majority of people (as illustrated by a high % Remove figure), some appear to have a
value proposition that compels certain individuals to keep the programs. For example,
the remote control software Real VNC receives a relatively high % Ignore Always rate
of 14.9 percent from users, compared to the 0.0 percent figure received by the Look2Me
spyware. This indicates that many users are aware of the nature of this remote control
software and are still willing to accept it because of its perceived
value, whereas they are not willing to accept identified spyware.
Contrasting this, we can also see that nearly 10 percent of users
choose to remove or quarantine the software, in all likelihood “
The goal of Windows Defender is
because they were not the person who installed the software. to provide individuals with visibility
and control over what is running on
Windows Defender allows individual users to make their own
decisions about whether to keep or remove a piece of identified
their computers. ”
software. In some cases, an individual will choose to remove or
quarantine the item. In others, an individual may choose to always
ignore the notification. These active choices represent individual, personal decisions. The
goal of Windows Defender is to provide individuals with visibility and control over what
is running on their computers.
Because the data does not make it possible to infer an individual’s intentions when he or
she chose to remove or not remove a piece of software, we encourage you to consider the
following questions:
1. Was the installation attempt intentional, an error, or the result of a covert
software action?
2. Was the individual aware of the true nature of this software program and its
behaviors prior to starting the installation?
We can make one final observation from the data behind Figure 31 that provides us with
an insight into the motivation behind the creation of the potentially unwanted software.
It is clear that the vast majority of these software programs are generating money, either
directly or indirectly, for their developers. While the amounts involved are unknown, it
can be assumed that there is enough potential profit to motivate both existing and new
developers to create new and updated potentially unwanted software programs for the
foreseeable future.
Microsof t Security Intelligence Repor t
42
A program that listens on specific port(s) and waits for commands from an
Backdoor
unauthorized individual.
A program that changes browser settings, such as the home page, without
Browser modifier
adequate consent. Also includes browser hijackers.
Settings modifier A program that changes computer settings with or without user’s knowledge.
A program that collects information, such as the Web sites a user visits,
Spyware without adequate consent. Installation may be without prominent notice or
without user’s knowledge.
This includes tools used by malware authors or hackers that can be legitimate
Tool
depending on the context of its usage.
43
Microsoft Security Research & Response uses these categories to help identify and
organize the potentially unwanted software that is included in the definition files used by
Windows Defender.
Rank Category Total 1H06 Total 2H06 % Change Figure 33. Top 10
categories of potentially
1 Adware 10,471,061 16,709,368 +59.6%
unwanted software
2 Software bundler 2,084,164 3,740,722 +79.5%
3 Spyware 2,185,191 3,496,078 +60.0%
4 Remote control software 735,638 2,775,996 +277.4%
5 Trojan downloader 1,152,761 2,737,200 +137.4%
6 Potentially unwanted software 1,335,412 2,561,809 +91.8%
7 Browser modifier 747,266 1,359,098 +81.9%
8 Trojan 858,953 1,352,291 +57.4%
9 Settings modifier 911,026 1,130,677 +24.1%
10 Monitoring software 212,547 500,737 +135.6%
You can see from these figures that the adware category is still, by far, the most prevalent
category of potentially unwanted software in circulation today by volume. However,
remote control software and monitoring software have both shown increased prevalence
during this period. This is due, largely, to increased criminal use of this potentially
unwanted software in order to commit theft of data or to control large numbers of
computer systems—techniques perceived as more lucrative than those methods more
commonly utilized in 1H06.
Additionally, the % Change column in Figure 33 illustrates that an increase in poten
tially unwanted software detection has been seen across all of the top ten categories.
However, if you are planning to use these numbers for trending purposes, it is important
to understand that they are affected by a variety of factors, specifically:
■ The period covered in 1H06 was not a full half-year; Windows Defender
Beta 2 was released on April 11, 2006, so the figures for 1H06 only cover
from that date through June 30, 2006.
■ The standalone version of Windows Defender moved out of beta during
this period.
■ The software detected by Windows Defender is continually increasing.
Microsof t Security Intelligence Repor t
44
■ The Microsoft Windows Vista Beta (with Windows Defender) was initially
released only to testers. The final version of Windows Vista was made
available to enterprise customers toward the end of this period.
■ Windows Defender is now available in languages other than English (which
was not the case in 1H06), and this has helped to increase the number of
computers that are now running it.
While it is safe to say that potentially unwanted software is still a major problem for
computer users worldwide, it would not be fair to use the % Change figure as a true
representation of any increase in any particular category between the first and second
halves of 2006. What is more notable is that the largest increases are seen in categories
that represent the greatest impact to the privacy and security of the individual.
Geographic Data
Because of the different methods used by the purveyors of potentially unwanted software
in different areas of the world, we see differences, in some cases significant differences,
in the prevalence of a particular item when comparing between countries, regions,
or by common language. These differences are a result of the
methods by which the software in question is disseminated. For
“ Windows Defender is now example, software that is distributed along with Web content
available in languages other than often advertises itself on various Web sites. These Web sites, in
English… and this has helped to turn, have a particular target demographic that frequents the site,
increase the number of computers resulting in a selection bias.
that are now running it.” Local language can also play a part in the bias. For example,
software that bundles with additional, potentially unwanted
software may not be prevalent in a particular area because a local
language version has not been developed or because there is a local language substitute
that is more popular.
A final factor that can explain the prevalence of potentially unwanted software in a
particular geographic region is that the distributors have specifically targeted that region,
using local cultural or social motivators. For example, if a sporting event generates a high
level of interest in a particular region, a social engineering attack can use this information
to attempt to exploit individuals who are interested in that event. This type of attack will
generate a spike in detection rates in that particular region.
Microsof t Security Intelligence Repor t
45
The countries included in Figure 34 represent 94.1 percent of removals and 93.5 percent
of detections recorded during 1H06 and 2H06. They are listed in order of the number of
total detected items.
Again, the percentage increases in detections for the second half of 2006 are significantly
higher than those reported in the January–June 2006 Microsoft Security Intelligence
Report. The same factors that were responsible for this increase in the previous section
of this report are responsible here as well—a longer detection period, Windows Defender
moving out of beta, new software added to the definition files, the addition of the Windows
Vista version of Windows Defender, and the increased customer install base.
However, even taking these factors into account, the data shows a worldwide, upward
trend in detections of potentially unwanted software. This increase also shows that the
developers of this software are still finding effective methods to distribute their software
worldwide.
Microsof t Security Intelligence Repor t
46
47
Figure 35 provides a list of the most prevalent of these rogue programs, ordered by
Figure 35. Rogue
number of reported instances. security software
Rogue security software uses a number of different techniques to attempt to trick the user.
To illustrate some of these techniques, the following section provides some examples of
this rogue software, highlighting the techniques used to trick the individual into installing
the software and obtain money from them.
It should be clear to the attentive reader that software in this group is very different
from some of the other categories, such as adware and remote control software. One
telling difference is the stark contrast in the Ignore Always category. As mentioned
earlier, Ignore Always is a clear choice that users can make in Windows Defender that
demonstrates their active intent to keep the software in question on their computer.
In Figure 35, when we compare the percentages in the % Ignore Always category
with those same numbers in Figure 31, for software such as BearShare or KaZaA, we
see significant differences in the frequency in which people actively seek to retain the
software when it is brought to their attention. From this data we can infer that users, when
faced with software from this group, do not actively choose to keep the software when
prompted to take action on these products. The percentage of individuals who do choose
Ignore Always are likely to have fallen for the social engineering aspects of the warnings
or are related directly to those developing and distributing the software.
Microsof t Security Intelligence Repor t
48
Changing Names
SpySheriff is the detection name used by Microsoft Security Research & Response for
several related products, including the original SpySheriff, as well as the following:
■ BraveSentry
■ DiaRemover
■ MalwareAlarm
■ Mr. Antispy
■ PestTrap
■ PestWiper
■ SpyTrooper
■ SpyDemolisher
■ SpyMarshall
Figure 36. Examples of
false infection messages Figure 36 illustrates two screen shots of warning messages used by different members of
provided by SpySheriff
and PestTrap this family to attempt to get the computer user to pay for the product.
As you can see, they are clearly based on the same original product and rely on the social
engineering techniques of fear and the use of an authoritative voice.
Microsof t Security Intelligence Repor t
49
Using Trojans
The SpySheriff family has used the Trojan downloader referred to as Win32/Renos to
help trick individuals into installing SpySheriff rogue security software. Win32/Renos is
delivered through malicious Web sites. If it is installed, it displays an infection alert that,
when clicked, downloads the rogue security software. In some cases, the false Win32/
Renos alert claims that Microsoft Windows is the source of this alert (see Figure 37).
SpyFalcon has been linked with both Win32/Renos and the Win32/Zlob families of
Trojan programs. Variants of the Win32/Zlob family can modify Microsoft Internet
Explorer settings, redirect the default Internet search page and home page, and attempt
to download and execute malicious software, such as SpyFalcon, from the Internet.
Once SpyFalcon has been installed, either with or without user consent, it behaves
similarly to SpySheriff in that it typically displays a dialog box prompting the user to
purchase a version of the software in order to remove spyware that it purports to have
found on the computer, as shown in Figure 38.
50
Scare Tactics
The Antivirus Golden rogue security software (also known as AntiVirus Gold, AVGold,
and SpyAxe) takes these warnings to a higher imperative. Figure 39 shows an example of
the overt scare tactics used by this rogue security software to frighten an individual into
paying money to the distributors.
The Internet-connected world of the twenty-first century has led to an environment that
is being exploited by distributors of malicious and potentially unwanted software to
trick or scare people into handing over money for false or questionable services. Thanks
to Windows Defender and other legitimate antispyware tools, it is becoming harder for
distributors of this software to go undetected. However, even legitimate antispyware
tools rely on the individual using the computer to understand the nature and source of the
warnings before choosing their preferred course of action. Only with continued education
and vigilance can we hope to squash the distribution and installation of these unwanted
software programs.
Executive Afterword
First surging to prevalence in 2004, backdoor Trojans, password stealers, bots, Trojan
downloaders, and droppers continue to be the dominant threats today. These are threats
that do not self-replicate, thus the quantities we are seeing speaks to a high level of
determination on the part of the attackers. It is the goal of these threats that explains this
high level of determination—installing malicious code to steal personal, financial, or
confidential information from the impacted user.
These Trojans are facilitated by an ever-expanding net of Internet interaction points.
E-mail, once considered the most serious potential infection vector, is now just one of
many. So-called “Web 2.0” technologies—forums, blog comments, instant messaging,
peer-to-peer file sharing, and even online games and social networking sites—provide
attackers with even greater opportunity to bypass protective measures and to interact with
the user directly.
Microsof t Security Intelligence Repor t
51
More and more frequently, this interaction occurs by first infecting and then exploiting
the ‘trust relationship’ between shared users of these social interaction sites. Examples
of this include injecting malicious links into forum postings and online interactions by
equally innocent users.
Even spyware, adware, and potentially unwanted software can no longer be considered
a category of threats distinct from the more traditional virus, worm, or Trojan. Increased
criminal leveraging of these technologies and loosely policed affiliate programs create
a lethal combination that poses a significant threat to users. An example is affiliate
programs that surreptitiously sneak credential-stealing code in the Web sites of
unsuspecting participants.
The nature of these attacks has evolved the meaning of ‘social engineering’ well beyond
that of yesteryear’s e-mail worm. It is no longer a matter of simply avoiding executable
file attachments or displaying a certain level of distrust where e-mail is concerned. Now,
every avenue of social interaction is vulnerable to these types of attacks—with victims
themselves unwittingly playing the role of malicious social engineer.
Protecting the user and preserving a rich Internet experience requires a holistic approach,
providing specific protection at every level of interaction. As George touched on in the
forward to this report, we must not simply focus on stopping these individual types
of threats; additionally we must also focus on developing resilient technologies and
initiatives that make these threats impractical for even the most determined criminal,
regardless of form or vector.
Technology can also help enable users to respond appropriately to socially engineered
attacks, but ultimately social interaction decisions remain in the hands of the user.
Increased awareness and education play an important role in meeting this challenge and
can help steer the appropriate decision. This commitment to helping the user make wise
choices is ultimately an industry challenge that all should rise up to meet.
Certainly the stakes have never been higher than they are today. Malicious code is no
longer a prank, and the impact is no longer relegated to the computer. The target is the
user, and their finances, credit history, and even their very identity can be placed at risk.
Our commitment is to ensure that we protect our customers to the best of our ability and
to provide them with the tools necessary to protect themselves.
Sincerely,
Vinny Gullotto
General Manager of Microsoft Security Research & Response
Microsoft Corporation
Microsof t Security Intelligence Repor t
52
Conclusion
Thank you for reviewing this second edition of the Microsoft Security Intelligence
Report. Through the broad deployment of offerings, such as the Windows Malicious
Software Removal Tool and Windows Defender, combined with the in-depth detection
capabilities of offerings such as Windows Live OneCare, the Windows Live OneCare
safety scanner, Microsoft Exchange Hosted Filtering, Microsoft Forefront for Exchange,
and the upcoming Microsoft Forefront Client Security release, Microsoft is committed
to providing customers and partners with relevant and accurate data. Future editions of
this report will include data from additional sources, as required by the shifting landscape
of security threats. To help protect against the threats outlined in this report, Microsoft
highly recommends that all customers:
■ Check for and apply software updates on an ongoing basis, including updates
provided for third-party applications. Windows Vista, Windows XP, and
Windows 2000 SP2 users can enable Automatic Updates to help ensure that
computers stay up to date with critical operating system and application
updates from Microsoft.
■ Enable a firewall, such as the Windows Firewall in Microsoft Windows XP
Service Pack 2 or the Windows Firewall in Windows Vista.
■ Install and maintain an up-to-date antimalware program that provides pro
tection from both malicious and potentially unwanted software. Microsoft
offers Windows Live OneCare (currently available) for individuals and
the upcoming Microsoft Forefront Client Security for businesses. Other
antimalware products can be found at http://www.microsoft.com/athome/
security/viruses/wsc/en-us/flist.mspx.
The following five specific suggestions are designed to help protect customers from the
key malicious and potentially unwanted software trends. These suggestions are intended
mainly for implementation within a corporate environment.
1. Implement the concept of least privilege within your organization. With least
privilege, even if malicious or potentially unwanted software is executed
within your environment, it is limited to performing non-administrative
actions. For example, kernel mode rootkits, which use drivers to affect the
operating system, cannot successfully install when run under least privilege.
2. Filter outgoing network traffic to help reduce the likelihood that an attacker
could leverage a backdoor Trojan to retrieve sensitive or confidential
information from your organization. The Windows Firewall in Windows
Vista provides rules-based filtering for both incoming and outgoing traffic.
Microsof t Security Intelligence Repor t
53
54
Windows Defender
Microsoft acquired Giant Company Software, Inc. in December 2004. Sixteen days after
the acquisition, Microsoft released the Microsoft AntiSpyware Beta 1 to help protect
Windows customers from spyware and other potentially unwanted software, as a part of
its larger initiatives in security and Trustworthy Computing. Following the release of the
beta, the Microsoft Security Research & Response team began to enhance the technology,
to better integrate it with other Microsoft technologies and platforms, and help ensure
its scalability, so that the technology and its infrastructure could support hundreds of
millions of users worldwide.
Microsof t Security Intelligence Repor t
55
56
As a service, Windows Live OneCare will continually evolve and provide new features,
enhancements, and other additions for its subscriber base. Currently, Windows Live
OneCare offers the following feature areas:
■ Protection Plus. Offers continuous, real-time antivirus monitoring united with
antispyware technology and a managed, two-way firewall that helps protect
against viruses, worms, Trojans, hackers, and other threats. In addition,
Windows Live OneCare activates the Phishing Filter in Internet Explorer® 7
to help detect and block known sites for online ID scams and theft.
■ Performance Plus. Regularly defragments the computer’s hard disk,
removes any unnecessary files that can clog the computer, and helps make
sure that important security updates from Microsoft are installed efficiently
and on time.
■ Backup and Restore. Regularly copies important files and settings to CD,
DVD, external hard disk, locally networked computers, and most USB-
connected storage devices.
■ Help Center. Provides unlimited online and phone support for subscribers.
The Windows Live OneCare subscription service was officially launched in June 2006,
and it is now available in 17 markets worldwide. Customers can download the service
directly from the Web at http://onecare.live.com or purchase a packaged version from
participating retailers worldwide. Windows Live OneCare is a part of the Microsoft
Windows Live™ strategy, designed to bring together and enhance the most relevant
experiences for consumers across information, relationships, inspiration, and safety.
Strongly integrated with security teams across Microsoft, Windows Live OneCare is
part of the ongoing commitment of Microsoft to security and Trustworthy Computing,
delivering solutions today to help protect customers and to take ongoing care of their PCs.
57
The Windows Live OneCare safety scanner is currently available at no charge in 44 markets
worldwide. First released as a beta product in November 2005 under the name Windows
Live Safety Center, the scanner has performed nearly 18 million scans since its debut.
In addition to the Windows Live OneCare safety scanner, the related Web site offers
consumer-friendly explanations about online threats and troubleshooting hints for everyday
computer issues, including the need for active malware solutions. The Windows Live
OneCare safety scanner is not intended as a replacement for always-on antivirus protection,
such as Windows Live OneCare. Instead, it provides home users with a one-time computer
clean-up and tune-up to help improve computer performance.
Microsoft provides the following antimalware products for business users.
58
59
60
61
Like Microsoft Forefront Security for Exchange Server, Forefront Security for SharePoint
provides multi-engine protection against the latest threats. Customers can use up to five
engines per scanning operation to ensure that they have maximum protection for their
document libraries for both internal and Internet-facing sites. All documents are scanned
as they are uploaded to, and retrieved from SharePoint document libraries.
62