{"id":75828,"date":"2016-11-01T10:47:45","date_gmt":"2016-11-01T17:47:45","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=75828"},"modified":"2023-09-26T09:16:21","modified_gmt":"2023-09-26T16:16:21","slug":"our-commitment-to-our-customers-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/11\/01\/our-commitment-to-our-customers-security\/","title":{"rendered":"Our commitment to our customers’ security"},"content":{"rendered":"
Windows is the only platform with a customer commitment to investigate reported security issues and proactively update impacted devices as soon as possible. And we take this responsibility very seriously.<\/p>\n
Recently, the activity group that Microsoft Threat Intelligence calls STRONTIUM conducted a low-volume spear-phishing campaign. Customers using Microsoft Edge on Windows 10 Anniversary Update are known to be protected from versions of this attack observed in the wild<\/strong>. This attack campaign, originally identified by Google\u2019s Threat Analysis Group, used two zero-day vulnerabilities in Adobe Flash and the down-level Windows kernel to target a specific set of customers.<\/p>\n We have coordinated with Google and Adobe to investigate this malicious campaign and to create a patch for down-level versions of Windows. Along these lines, patches for all versions of Windows are now being tested by many industry participants, and we plan to release them publicly on the next Update Tuesday, Nov 8.<\/p>\n We believe responsible technology industry participation puts the customer first, and requires coordinated vulnerability disclosure<\/a>. Google\u2019s decision to disclose these vulnerabilities before patches are broadly available and tested is disappointing, and puts customers at increased risk.<\/p>\n To address these types of sophisticated attacks, Microsoft recommends that all customers upgrade to Windows 10, the most secure operating system we\u2019ve ever built, complete with advanced protection for consumers and enterprises at every layer of the security stack. Customers who have enabled Windows Defender Advanced Threat Protection (ATP) will detect STRONTIUM\u2019s attempted attacks thanks to ATP\u2019s generic behavior detection analytics and up-to-date threat intelligence.<\/p>\n -Terry<\/p>\n Microsoft aggregates the details of threat activity\u2014malware, infrastructure, victim classes, and attacker techniques\u2014into activity groups <\/em>to improve our readers\u2019 ability to understand the reasons behind cyber attacks. STRONTIUM is an activity group that usually targets government agencies, diplomatic institutions, and military organizations, as well as affiliated private sector organizations such as defense contractors and public policy research institutes. Microsoft has attributed more 0-day exploits to STRONTIUM than any other tracked group in 2016. STRONTIUM frequently uses compromised e-mail accounts from one victim to send malicious e-mails to a second victim and will persistently pursue specific targets for months until they are successful in compromising the victims\u2019 computer. Once inside, STRONTIUM moves laterally throughout the victim network, entrenches itself as deeply as possible to guarantee persistent access, and steals sensitive information.<\/p>\n STRONTIUM must accomplish three objectives in order for the attack to succeed:<\/p>\n Microsoft has several threat prevention and exploit mitigation features available to counter these steps.<\/p>\n Based on the analysis performed by the Windows Defender ATP Exploit research team and the Microsoft Security Response Center (MSRC), the vulnerability in Adobe Flash<\/a> leveraged by STRONTIUM was found to be a use-after-free issue affecting ActionScript runtime code. Adobe has since released an update<\/a> to fix this vulnerability. Microsoft is actively partnering with Adobe to implement additional mitigations against this class of exploit.<\/p>\n The Windows kernel vulnerability targeted by STRONTIUM\u2019s EoP exploit is present in Windows Vista through Windows 10 Anniversary Update. However, prior to this attack, Microsoft implemented new exploit mitigations in the Windows 10 Anniversary Update version of the win32k kernel component. These Windows 10 Anniversary Update mitigations, which were developed based on proactive internal research, stop all observed in-the-wild instances of this exploit.<\/p>\n Following successful elevation of privilege, a backdoor is downloaded, written to the file system, and executed into the browser process. However, the backdoor DLL (along with any other untrusted software) can be blocked by implementing strict Code Integrity policies. Microsoft Edge natively implements Code Integrity<\/a> to prevent this common post-exploitation step. Users of Internet Explorer and other browsers can also be protected through the use of Device Guard<\/a>.<\/p>\n Multiple behavioral and machine learning detection rules alert on various elements of the kill chain throughout STRONTIUM\u2019s current attack. Windows Defender ATP can generically detect, without any signature, multiple stages of the attack such as the creation of uncommon DLL libraries on disk from the browser process, unexpected changes of process token and integrity levels (EoP), and the loading of recently created DLL libraries under abnormal process conditions (Figure 3).<\/p>\n <\/p>\n Windows Defender ATP Detection of Kernel EOP used by STRONTIUM<\/em><\/p>\n Additionally, threat intelligence and IOCs specific to this attack unearthed by Microsoft Threat Intelligence have been added to Windows Defender ATP and Office 365 ATP. These alerts work alongside the existing threat summary and in-depth profiles on STRONTIUM available in the Windows Defender ATP customer portal.<\/p>\nSTRONTIUM: A brief history<\/h1>\n
The exploits<\/h1>\n
\n
Adobe Flash exploitation: CVE-2016-7855<\/h2>\n
Elevation of privileges<\/h2>\n
Backdoor installation<\/h2>\n
Detecting the attack with Windows Defender ATP<\/h1>\n