Zeroing in on malware propagation methods

From Botnets.fr
Revision as of 21:21, 5 August 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " download.microsoft.com" to "")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Zeroing in on malware propagation methods
SIRv11.png
Botnet
Malware Alureon, Bancos, Bredolab, Brontok, Bubnix, Conficker, Cutwail, Cycbot, FakeRean, FakeSpypro, FakeXPA, Frethog, Hamweq, Jeefo, Lethic, Parite, Pushbot, Ramnit, Randex, Renocide, Renos, Rimecud, Sality, Taterf, Vobfus, Yimfoca, Zbot
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2011 /
Editor/Conference Microsoft
Link http://download.microsoft.com/download/0/3/3/0331766E-3FC4-44E5-B1CA-2BDEB58211B8/Microsoft Security Intelligence Report volume 11 Zeroing in on Malware Propagation Methods English.pdf (Archive copy)
Author Joe Faulhaber, David Felstead, Paul Henry, Jeff Jones, Ellen Cram Kowalczyk, Jimmy Kuo, John Lambert, Marc Lauricella, Aaron Margosis, Michelle Meyer, Anurag Pandit, Anthony Penta, Dave Probert, Tim Rains, Mark E. Russinovich, Weijuan Shi, Adam Shostack, Frank Simorjay, Hemanth Srinivasan, Holly Stewart, Matt Thomlinson, Jeff Williams, Scott Wu, Terry Zink
Type

Abstract

Volume 11 of the Microsoft® Security Intelligence Report (SIRv11) provides in-depth perspectives on software vulnerabilities and exploits, malicious code threats, and potentially unwanted software in Microsoft and third-party software. Microsoft developed these perspectives based on detailed trend analyses over the past several years, with a focus on the first half of 2011.

This document contains a featured intelligence section on malware propagation methods, including data, analysis, and a taxonomy for classifying the methods that threat families use to spread. The full report includes deep analysis of trends found in more than 100 countries/regions around the world and offers ways to manage risks to your organization, software, and people. The full report, as well as previous volumes and related videos, can be downloaded from www.microsoft.com/sir.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2011BFR816,
   editor = {Microsoft},
   author = {Joe Faulhaber, David Felstead, Paul Henry, Jeff Jones, Ellen Cram Kowalczyk, Jimmy Kuo, John Lambert, Marc Lauricella, Aaron Margosis, Michelle Meyer, Anurag Pandit, Anthony Penta, Dave Probert, Tim Rains, Mark E. Russinovich, Weijuan Shi, Adam Shostack, Frank Simorjay, Hemanth Srinivasan, Holly Stewart, Matt Thomlinson, Jeff Williams, Scott Wu, Terry Zink},
   title = {Zeroing in on malware propagation methods},
   date = {28},
   month = Mar,
   year = {2011},
   howpublished = {\url{http://download.microsoft.com/download/0/3/3/0331766E-3FC4-44E5-B1CA-2BDEB58211B8/Microsoft_Security_Intelligence_Report_volume_11_Zeroing_in_on_Malware_Propagation_Methods_English.pdf}},
 }