{"id":76100,"date":"2015-11-16T14:02:11","date_gmt":"2015-11-16T22:02:11","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=76100"},"modified":"2023-05-15T23:06:06","modified_gmt":"2023-05-16T06:06:06","slug":"microsoft-security-intelligence-report-strontium","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2015\/11\/16\/microsoft-security-intelligence-report-strontium\/","title":{"rendered":"Microsoft Security Intelligence Report: Strontium"},"content":{"rendered":"
The Microsoft Security Intelligence Report<\/a> (SIR) provides a regular snapshot of the current threat landscape, using data from more than 600 million computers worldwide.<\/p>\n The latest report (SIRv19) was released this week and includes a detailed analysis of the actor group STRONTIUM \u2013 a group that uses zero-day exploits to collect the sensitive information of high-value targets in government and political organizations.<\/p>\n Since 2007, the group has targeted:<\/p>\n A STRONTIUM actor attack usually has two components:<\/p>\n Spear phishing<\/strong><\/p>\n We estimate the STRONTIUM actor targeted several thousand people with spear phishing attacks during the first half of 2015. The goal of the spam email attack is to get a list of high-value individuals with access to sensitive information.<\/p>\n The phishing email usually attempts to trick the target into believing there has been an unauthorized user accessing their account.<\/p>\n The email includes a link to a website under the attacker\u2019s control that prompts the victim to change their password. If the attack is successful, the stolen credentials can be used to access the victim\u2019s email account.<\/p>\n Visiting the malicious website can also send sensitive information to the attacker, even when no credentials are entered. The sensitive information can include details of the victim\u2019s PC -including its IP address, browser and operating system versions, and any browser add-ons installed. This information can be used to target the individual with software exploits.<\/p>\n Malware downloads<\/strong><\/p>\n The second phase of a STRONTIUM actor attack is to install malware on the compromised machine in an attempt to gain access to other machines on the network.<\/p>\n Usually, the malware is installed through a malicious link in an email. However, we have also seen social networks used to spread malicious links. The highly-targeted emails use current events, such as an upcoming conference, to entice the victim to click a link for \u201cadditional information\u201d. The email is sent from well-known email providers and sender names that are designed to look credible.<\/p>\n When the link is clicked, a drive-by-download attack is launched using software vulnerabilities. The attacks often use zero-day exploits<\/a> that target vulnerabilities for which the affected software vendor has not yet released a security update.<\/p>\n If the attack is successful the attacker tries to compromise other machines within the targeted organization to gather more sensitive information.<\/p>\n See the Microsoft Security Intelligence Report (SIRv19)<\/a> for more technical details on the methods used by STRONTIUM.<\/p>\n You can reduce the likelihood of a successful compromise in a number of ways. Use an up-to-date real-time security product, such as Windows Defender for Windows 10<\/a>.<\/p>\n In an enterprise environment you should also:<\/p>\n TheMicrosoft Security Intelligence Report (SIRv19)<\/a> has more advice and detailed analysis of STRONTIUM, as well as other information about malware and unwanted software.<\/p>\n The Microsoft Malware Protection Center\u2019s November Threat Intelligence Report<\/a> also includes detailed information, resources, and advice to mitigate the risk of advanced persistent threats (APTs).<\/p>\n<\/div>\n Questions, concerns, or insights on this story? Join discussions at the Microsoft community<\/a> and Windows Defender Security Intelligence<\/a>.<\/p>\n\n
Attack vectors: How they manage to get in<\/h3>\n
\n
Preventing attacks<\/h3>\n
\n
\nTalk to us<\/strong><\/h4>\n