Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Microsoft: Software Activation Key Generators Linked to Malware Infections

The growth of software activation key generators is linked to the spread of malware, according to findings from Microsoft’s latest Security Intelligence report.

In volume 13 of the report, which was released Monday, Microsoft reported that Win32/Keygen was the most commonly reported threat family in the first half of 2012. Win32/Keygen, which represents software activation key generators, was detected nearly five million times.

The growth of software activation key generators is linked to the spread of malware, according to findings from Microsoft’s latest Security Intelligence report.

In volume 13 of the report, which was released Monday, Microsoft reported that Win32/Keygen was the most commonly reported threat family in the first half of 2012. Win32/Keygen, which represents software activation key generators, was detected nearly five million times.

A user who downloads the package runs the key-generator utility to create a product key that will supposedly allow the software to be used illegally, Microsoft explained. In many cases, the distributed packages contain malware alongside – or instead of – the pirated software, the company noted in the report.

“Keygen detections have increased by a factor of 26 since the first half of 2010 and today Keygen is the number one consumer threat family worldwide, rising above other prevalent threat families like Pornpop, Blacole, Conficker and FakePAV,” blogged Tim Rains,  Director of Product Management in Microsoft’s Trustworthy Computing group. “The prevalence of Keygen varies from location to location, however it is listed as a top 10 threat for 103 of the 105 countries/regions studied in SIRv13.  That means Keygen is in the top 10 list of threats for 98 percent of the locations we provide analysis for in SIRv13.”

According to the report, more than 76 percent of computers infected with Keygen also reported detections of other malware families.

“This is a good indication that Keygen is often bundled with, or leads to, malware infections,” Rains blogged. “In the report we have a feature story which dives into greater detail on deceptive downloads like Keygen and provides mitigation guidance on how to help protect against this type of social engineering threat.”

The strategy of bundling malware with software on unsecure file distribution sites and networks is not limited to pirated commercial software—attackers sometimes take advantage of traffic in freely distributed software as well, the report notes. In the first half of the year, the Microsoft Malware Protection Center spotted 35 different threat families being distributed using the file name install_adobeflash.exe, which poses as an installation package for Adobe Flash Player.

Besides malware, the report also delves into the number of vulnerabilities. Vulnerability disclosures across the industry increased 11.3 percent during the first six months of the year when compared to the second half of 2011.

Advertisement. Scroll to continue reading.

 “This increase reverses a trend of small declines in every six-month period from 2H09 to 2H11,” according to the report. “The majority of the increase comes from application vulnerabilities, as operating system vulnerabilities continue a downward trend.”

The number of computers reporting exploits delivered through HTML or JavaScript remained high during the first half of 2012, primarily due to the Blacole exploit family. Blacole is used by the notorious “Blackhole” exploit kit to deliver malware through malicious webpages, and was the most commonly detected exploit family during the first half of the year.

“Prospective attackers buy or rent the Blacole kit on hacker forums and through other illegitimate outlets,” according to the report. “It consists of a collection of malicious webpages that contain exploits for vulnerabilities in versions of Adobe Flash Player, Adobe Reader, Microsoft Data Access Components (MDAC), the Oracle Java Runtime Environment (JRE), and other popular products and components. When the attacker installs the Blacole kit on a malicious or compromised web server, visitors who don’t have the appropriate security updates installed are at risk of infection through a drive-by download attack.”

The report can be downloaded here.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.