Follow:

Microsoft threat intelligence archive


Threat intelligence July 2015 - Macro-based malware

View the report online | Download as PDF

Macro-based malware uses macros embedded in Microsoft Office files to sneak in further infection. This report includes the following sections:

  • Overview: Evolution of macro-based malware
  • Statistics: Macro-based malware infection across the globe
  • Characteristics: Distribution patterns, symptoms of infection, and diagrams
  • Analysis: Examination of a macro-based attack
  • Mitigation: General advice for mitigating the risk of infection from macro-based malware
  • Prevalent threats: Top malware detected by Microsoft security software over the past 30 days


Older reports and whitepapers


Microsoft Malware Protection Center Threat Report—Rootkits

Author: Heather Goudey | Download

Rootkits provide stealth capabilities to malware. This report examines how attackers use rootkits, and how rootkits function on affected computers.

Microsoft Malware Protection Center Threat Report—EyeStye

Authors: Jaime Wong and Shannon Sabens | Download

This report examines the prevalent EyeStye family of malware.

Microsoft Malware Protection Center Threat Report—Poison Ivy

Authors: Tareq Saade, Dan Kurc, and Holly Stewart | Download

This report provides an overview of the Win32/Poison (Poison Ivy) family of malware.

Special Edition Security Intelligence Report: Battling the Rustock Threat

Authors: David Anselmi, Richard Boscovich, T.J. Campana, Samantha Doerr, Marc Lauricella, Oleg Petrovsky, Tareq Saade, Holly Stewart | Download: PDF format | XPS format

This special edition of the SIR provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.

Microsoft Malware Protection Center Threat Report—Qakbot

Authors: Dan Kurc, Tareq Saade, Aaron Putnam, Holly Stewart | Download

This report provides an overview of the Win32/Qakbot (Qakbot) family of malware.

Battling the ZBot Threat

Authors: T.J. Campana, Joe Faulhaber, Paul Henry, Matt McCormack, Frank Simorjay, Holly Stewart | Download

This document provides an overview of the Win32/Zbot family of password-stealing trojans.