Cybersecurity
Threats You Should
Know About in 2018
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Every year, Microsoft collects security and threat intelligence
from their global network and compiles the trends into the
Microsoft Security Intelligence Report.
To keep up with the always evolving landscape, the
Security Intelligence Report provides a thorough analysis of
security threats and how to best mitigate the top attack types.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
This year’s report investigates three main topics
Botnets
Easy Mark Attack Methods
Ransomware
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
Bots are programs that allow attackers
to infect and take control of computers,
and botnets are a network of those bots
controlled by command-and-control
(C&C) servers.
On November 29, 2017, Microsoft’s
Digital Crimes Unit tackled a leading
botnet that infected more than 23 million
IP addresses: Gamarue.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
Microsoft analyzed over 44,000 malware samples that revealed
Gamarue’s sprawling infrastructure.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
With advancing security
solutions, hackers are more
apt to go after easy targets
through social engineering
and are constantly evolving
their tactics for maximum
efficiency.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
Here is one example of low-hanging fruit.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
Here is another example of low-hanging fruit.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
Ransomware infects and
encrypts files (and sometimes
entire disks) to prevent
access until a ransom is paid
– and there’s no guarantee
victims will regain access.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
Ransomware made a real-world impact in 2017, bringing down critical
services like hospitals, transportation, and traffic systems. Here are
few of the unprecedented and devastating ransomware families
responsible for the 2017 attacks:
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Learn About Recent Cyberthreats
Download the full Microsoft Security Intelligence Report,
Volume 23 for more security insights.
www.microsoft.com/sir
© 2018 Microsoft Corporation. All rights reserved. This document is
for informational purposes only.
Microsoft makes no warranties, express or implied, with respect to
the information presented here.

Cybersecurity threats you should know about in 2018

  • 1.
  • 2.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Every year, Microsoft collects security and threat intelligence from their global network and compiles the trends into the Microsoft Security Intelligence Report. To keep up with the always evolving landscape, the Security Intelligence Report provides a thorough analysis of security threats and how to best mitigate the top attack types.
  • 3.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 This year’s report investigates three main topics Botnets Easy Mark Attack Methods Ransomware
  • 4.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Botnets Bots are programs that allow attackers to infect and take control of computers, and botnets are a network of those bots controlled by command-and-control (C&C) servers. On November 29, 2017, Microsoft’s Digital Crimes Unit tackled a leading botnet that infected more than 23 million IP addresses: Gamarue.
  • 5.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Botnets Microsoft analyzed over 44,000 malware samples that revealed Gamarue’s sprawling infrastructure.
  • 6.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Botnets
  • 7.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods With advancing security solutions, hackers are more apt to go after easy targets through social engineering and are constantly evolving their tactics for maximum efficiency.
  • 8.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is one example of low-hanging fruit.
  • 9.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is another example of low-hanging fruit.
  • 10.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware infects and encrypts files (and sometimes entire disks) to prevent access until a ransom is paid – and there’s no guarantee victims will regain access.
  • 11.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware made a real-world impact in 2017, bringing down critical services like hospitals, transportation, and traffic systems. Here are few of the unprecedented and devastating ransomware families responsible for the 2017 attacks:
  • 12.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Ransomware
  • 13.
    SECURIT Y INTELLIGENCE REPORT , VOLUME 23 Learn About Recent Cyberthreats Download the full Microsoft Security Intelligence Report, Volume 23 for more security insights. www.microsoft.com/sir
  • 14.
    © 2018 MicrosoftCorporation. All rights reserved. This document is for informational purposes only. Microsoft makes no warranties, express or implied, with respect to the information presented here.

Editor's Notes

  • #4 Please update icons with those found in the source file
  • #5 Please update image with the asset in the source file
  • #6 Please update image with the asset in the source file
  • #8 Please update image with the asset in the source file
  • #9 Please update image with the asset in the source file
  • #10 Please update image with the asset in the source file
  • #11 Please update image with the asset in the source file
  • #12 Please update image with the asset in the source file
  • #13 Please update image with the asset in the source file
  • #14 Please update image with the asset in the source file