Microsoft Corp. has released the Microsoft Security Intelligence Report volume 12 (SIRv12), which found that the Conficker worm was detected approximately 220 million times worldwide in the past two and a half years, making it one of the biggest ongoing threats to enterprises. The study also revealed the worm continues to spread because of weak or stolen passwords and vulnerabilities for which a security update exists.
According to the SIRv12, quarterly detections of the Conficker worm have increased by more than 225 percent since the beginning of 2009. In the fourth quarter of 2011 alone, Conficker was detected on 1.7 million systems worldwide. In examining the reasons behind Conficker’s prevalence in organizations, research showed that 92 percent of Conficker infections were a result of weak or stolen passwords, and 8 percent of infections exploited vulnerabilities for which a security update exists.
Conficker is one of the biggest security problems we face, yet it is well within our power to defend against stated by Tim Rains, director of Microsoft Trustworthy Computing. It is critically important that organizations focus on the security fundamentals to help protect against the most common threats.
The SIRv12 also revealed that many of the threats often referred to as Advanced Persistent Threats (APTs) are no more advanced or sophisticated than other types of attacks. In most cases, these attacks leverage known vectors such as exploiting weak or stolen passwords and vulnerabilities for which security updates exist, but their success lies in the persistence and determination in trying different tactics to compromise the target. This is why Microsoft refers to these types of threats as Targeted Attacks performed by Determined Adversaries, rather than APTs.
Microsoft recommends that customers and businesses adhere to the following security fundamentals to help ensure they are protected:
- Use strong passwords and educate employees on their importance
- Keep systems up to date by regularly applying available updates for all products
- Use antivirus software from a trusted source
- Invest in newer products with a higher quality of software protection
- Consider the cloud as a business resource
With organizations being presented with significant amounts of data and media reports on cyberthreats, the Microsoft Security Intelligence Report volume 12 gives us good perspective on recent trends in the global threat landscape stated by Bob Rodger, global head of IT Infrastructure Security at HSBC. The report, in combination with other sources of intelligence, assists us to more accurately and effectively invest, prioritize and make informed decisions about our security infrastructure to ensure that our business continues to be optimally protected from threats.
For businesses, as Scott Charney, corporate vice president of Microsoft Trustworthy Computing, outlined in his keynote presentation at RSA 2012, Microsoft recommends a more holistic approach to risk management to help protect against both broad-based and targeted attacks, including the following:
Prevention: Employ security fundamentals and pay close attention to configuration management and timely security update deployment.
Detection: Carefully monitor and perform advanced analysis to identify threats. Keep abreast of security events and leverage credible sources of security intelligence.
Containment: If the targeted organization has configured its environment with targeted attacks by determined adversaries in mind, it is possible to contain the attacker’s activities and thereby buy time to detect, respond to and mitigate the attack. To contain an attack, consideration should be given to architecting domain administration models that limit the availability of administrator credentials and apply available technologies, such as IPsec-based network encryption, to restrict unnecessary interconnectivity on the network.
Recovery: It is important to have a well-conceived recovery plan, supported by suitably skilled incident response capability. Maintain a “crisis committee” to set response priorities and engage in exercises to test the organization’s ability to recover from different attack scenarios.