Cybercrime

Microsoft: Phishing – Not Zero-Day Threats – Cause the Most Problems

On Tuesday, in addition to the monthly “Patch Tuesday” security updates for Windows and Office platforms, Microsoft released the eleventh volume of its Security Intelligence Report.

<p>On Tuesday, in addition to the monthly <a href="http://www.securityweek.com/microsoft-delivers-23-security-fixes-octobers-patch-tuesday" title="Patch Tuesday: October 2011">"Patch Tuesday" security updates</a> for Windows and Office platforms, <strong>Microsoft</strong> released the eleventh volume of its <strong><a href="http://download.microsoft.com/download/0/3/3/0331766E-3FC4-44E5-B1CA-2BDEB58211B8/Microsoft_Security_Intelligence_Report_volume_11_English.pdf" target="_blank" rel="noopener">Security Intelligence Report</a></strong>.</p>

On Tuesday, in addition to the monthly “Patch Tuesday” security updates for Windows and Office platforms, Microsoft released the eleventh volume of its Security Intelligence Report.

The report, which gives a deep look into security trends, has some interesting data when it comes to malware propagation.

Less than one-percent of the exploits observed in the first-half of 2011 were targeting Zero-Day vulnerabilities Microsoft said. In fact, most of the attacks centered on previously patched issues, and leveraged Phishing to spread the malicious payloads. According to the data, Phishing accounted for 44.8-percent of the malware spread during the reporting period.

Sticking to Phishing, social networks and their users were a favorite target, as the socially engineered attacks originated on such sites, reaching a peak of nearly 85-percent in April. This trend hammers home the point made by the software giant, when they noted that the Web is the main source of malicious infections and malware propagation.

The vulnerabilities attacked the most include, two against Adobe Flash, which were patched before exploits were being circulated online, as well as issues within Java. Brute-force attacks and AutoRun attacks were the other trending methods during the first-half of 2011.

Microsoft’s point isn’t that Zero-Days should be ignored, but that criminals will not reinvent the wheel, if they know that low hanging fruit exists and that users will do almost anything. In the cases monitored for the latest SIR, the majority were preventable as long as the targeted host was consistently patched.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version