{"id":87451,"date":"2018-12-19T08:00:11","date_gmt":"2018-12-19T16:00:11","guid":{"rendered":""},"modified":"2025-12-16T08:36:26","modified_gmt":"2025-12-16T16:36:26","slug":"tackling-phishing-with-signal-sharing-and-machine-learning","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/","title":{"rendered":"Tackling phishing with signal-sharing and machine learning"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Across services in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Announcing-Microsoft-Threat-Protection\/ba-p\/262783\">Microsoft Threat Protection<\/a>, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure. Our <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/12\/03\/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp\/\">industry-leading visibility<\/a> into the entire attack chain translates to enriched protection that\u2019s evident in many different attack scenarios, including flashy <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/12\/03\/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers\/\">cyberattacks<\/a>, massive <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/09\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/\">malware campaigns<\/a>, and even <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/09\/06\/small-businesses-targeted-by-highly-localized-ursnif-campaign\/\">small-scale, localized attacks<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Phishing is another area where this protection has proven effective. While phishing attacks have been part of the daily hum of cybercriminal activity for years, they remain some of the most prevalent threats to this day. <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/06\/07\/machine-learning-vs-social-engineering\/\">Specialized machine learning-based detection algorithms<\/a> in Windows Defender ATP zero in on non-executable file types like scripts and document files typically used for phishing and other social engineering attacks. These file type-specific classifiers are part of the metadata-based ML models that can make a verdict on suspicious files within a fraction of a second.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Recently, anomaly detection algorithms in the <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Windows Defender ATP<\/a> <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/windows-defender-antivirus-in-windows-10\">next-generation protection<\/a> pointed to multiple PDF files that only Microsoft detects. These malicious PDF files were blocked by machine learning models that assimilate signals from other components of our protection stack, exemplifying how comprehensive telemetry, signal-sharing, and machine learning allows Microsoft to deliver best-in-class security.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1461\" height=\"1155\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/VT-PDF-2.png\" alt=\"One of several PDF files that only Microsoft was detecting at the time it was first observed (Source: https:\/\/www.virustotal.com\/) \" class=\"wp-image-87454\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/VT-PDF-2.png 1461w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/VT-PDF-2-300x237.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/VT-PDF-2-768x607.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/VT-PDF-2-1024x810.png 1024w\" sizes=\"auto, (max-width: 1461px) 100vw, 1461px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>One of several PDF files that only Microsoft was detecting (as Trojan:PDF\/Sonbokli.A!cl) at the time it was first observed (Source: <a href=\"https:\/\/www.virustotal.com\/\">https:\/\/www.virustotal.com\/<\/a>) <\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"machine-learning-based-detection-of-malicious-pdf-files-used-for-phishing\">Machine learning-based detection of malicious PDF files used for phishing<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Windows Defender ATP uses multiple layers of machine learning models to correctly identify malicious content. Most attacks are caught by the first few layers, which swiftly make a verdict and protect customers at first sight during the early stages of attacks. More sophisticated attacks may need the more complex classifiers in further layers, which take more time but make sure additional protections catch attacks that evade the first, faster classifiers.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"531\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/06\/fig5-multilayered-ML-models-non-pe.png\" alt=\"Multiple layers of machine learning in Windows Defender ATP.\" class=\"wp-image-83530\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/06\/fig5-multilayered-ML-models-non-pe.png 866w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/06\/fig5-multilayered-ML-models-non-pe-300x184.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/06\/fig5-multilayered-ML-models-non-pe-768x471.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/06\/fig5-multilayered-ML-models-non-pe-392x240.png 392w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Multiple layers of machine learning in Windows Defender ATP<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To catch malicious PDF files that are used for phishing and other cyberattacks, we built and continuously train machine learning classifiers that are designed to catch malware using this specific file type. These classifiers inspect file metadata for malicious characteristics and content. These classifiers regularly catch PDF files used for phishing.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"700\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-ML-1.png\" alt=\"Screenshot of a phishing PDF\" class=\"wp-image-87475\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-ML-1.png 530w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-ML-1-227x300.png 227w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"700\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-ML-3.png\" alt=\"Screenshot of a phishing PDF\" class=\"wp-image-87481\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-ML-3.png 530w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-ML-3-227x300.png 227w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"> &nbsp; <em>Typical malicious PDF files used for phishing (1) spoof a popular brand, app, or service, (2) contain a link to a phishing page, and (3) have the familiar social engineering techniques to convince recipients to click the link.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"enrichment-with-url-and-domain-reputation\">Enrichment with URL and domain reputation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Through the Microsoft Intelligent Security Graph, we enrich this detection algorithm with URL and domain reputation intelligence from <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-smartscreen\/windows-defender-smartscreen-overview\">Windows Defender SmartScreen<\/a>, the technology that powers the anti-phishing technology in Microsoft Edge, as well as the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-security-center\/wdsc-firewall-network-protection\">Network protection<\/a> capability in Windows Defender ATP.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Windows Defender ATP queries URL and domain reputation in real time, so any PDF file that contains a known malicious domain or URL is detected by Windows Defender ATP.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1356\" height=\"632\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-URL-3.png\" alt=\"Diagram showing Windows Defender ATP querying Office 365 ATP\" class=\"wp-image-87493\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-URL-3.png 1356w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-URL-3-300x140.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-URL-3-768x358.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-URL-3-1024x477.png 1024w\" sizes=\"auto, (max-width: 1356px) 100vw, 1356px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Enriching detection with URL and domain reputation<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That is how Windows Defender ATP blocked several PDF files that no other antivirus solution knew were malicious at first sight.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"700\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-link-1.png\" alt=\"Screenshot of a phishing PDF\" class=\"wp-image-87469\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-link-1.png 530w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-link-1-227x300.png 227w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"700\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-link-2.png\" alt=\"Screenshot of a phishing PDF\" class=\"wp-image-87472\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-link-2.png 530w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-link-2-227x300.png 227w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"> &nbsp; <em>Sample malicious PDF files blocked by detection algorithms aided by URL and domain reputation<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"enrichment-with-office-365-atp-intelligence\">Enrichment with Office 365 ATP intelligence<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Windows Defender ATP also integrates with <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-atp\">Office 365 ATP<\/a>. This integration provides rich optics into threats like PDF files that are commonly distributed via email. When Office 365 ATP detects a suspicious file or URL in emails, it uses a detonation platform, heuristics, and machine learning to make a verdict. This verdict is shared to other services in Microsoft Threat Protection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the case of PDF files, signals from Office 365 ATP enhances Windows Defender ATP\u2019s capability to detect and block malicious PDF files on endpoints at first sight, even if they arrive through some other means or if they are observed in environments that don\u2019t use Office 365 ATP.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1356\" height=\"632\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3.png\" alt=\"Diagram showing Windows Defender ATP querying Windows Defender SmartScreen\" class=\"wp-image-87490\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3.png 1356w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-300x140.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-768x358.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-1024x477.png 1024w\" sizes=\"auto, (max-width: 1356px) 100vw, 1356px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Enriching detection with URL and domain reputation with Officer 365 ATP intelligence<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here are sample malicious PDFs that Windows Defender ATP detected with intelligence from Office 365 ATP.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"700\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-email-3.png\" alt=\"Screenshot of a phishing PDF\" class=\"wp-image-87463\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-email-3.png 530w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-email-3-227x300.png 227w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"700\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-email-2.png\" alt=\"Screenshot of a phishing PDF\" class=\"wp-image-87460\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-email-2.png 530w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-email-2-227x300.png 227w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"> &nbsp; <em>Sample malicious PDF files blocked by detection algorithms aided by Office 365 ATP intelligence<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-threat-protection-signal-sharing-drives-comprehensive-protection\">Microsoft Threat Protection: Signal sharing drives comprehensive protection<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Every day, we <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/09\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/\">see millions of new, first-seen attacks<\/a> and malware campaigns that run for just 60 minutes or less. Protections need to be automatic, real-time, and accurate.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The signal sharing and remediation orchestration across Microsoft Threat Protection is robust and comprehensive. Take this actual protection timeline as example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">11\/13\/2018 05:47 \u2013 Windows Defender SmartScreen identified a new malicious URL: <em>hxxps:\/\/triplesixone[.]info\/tfds\/index[.]php?fruitly=mixer.<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\">11\/21\/2018 11:53 \u2013 Attackers started using the URL in phishing campaigns. Office 365 ATP blocked a PDF file that contained the malicious URL. Microsoft Exchange Online Protection (EOP) instantly blocked the emails carrying the malicious PDF.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">11\/21\/2018 11:57 \u2013 Windows Defender ATP saw and blocked the PDF in environments that don\u2019t use Office 365 ATP or EOP.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"700\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-final.png\" alt=\"Screenshot of a phishing PDF\" class=\"wp-image-87466\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-final.png 530w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/phishing-PDF-final-227x300.png 227w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Phishing PDF (SHA-256 99ff3cd0c0e0acccdc81f8af39205bfadc2a37ea5216a10a7ca2a402a6115b56) contained a malicious URL that was first observed one week prior<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this example, Windows Defender SmartScreen drove protections, but signal-sharing happens in multiple directions across Microsoft services. In other cases, Windows Defender ATP, Office 365 ATP, or another service can drive protection, depending on which technology identifies the threat first.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This exemplifies the comprehensive protection that <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Announcing-Microsoft-Threat-Protection\/ba-p\/262783\">Microsoft Threat Protection<\/a> drives every day through the integration of security solutions. Individually, these services protect customers and evolve to address the latest threats. Working together, these technologies enrich each other\u2019s capabilities and intensify protection for customers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Announcing-Microsoft-Threat-Protection\/ba-p\/262783\">Learn more about Microsoft Threat Protection<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Begin a <a href=\"https:\/\/portal.office.com\/signup\/logout?OfferId=101bde18-5ffb-4d79-a47b-f5b2c62525b3&amp;dl=ENTERPRISEPREMIUM&amp;culture=en-US&amp;country=US\">free Office 365 E5 trial<\/a> and a <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">free Windows Defender ATP trial<\/a> today.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>Allan Sepillo <\/em><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Windows Defender Research team<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>with <\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>Eric Avena<\/em><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Content Experience team <\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indicators-of-attack\">Indicators of attack<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">File name: <em>AppE0CommerenceID_825126723.doc[876].pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: 7d01a444a72a2779268d2e040a083caefbd14b2031142ca24e0bad272f1045f2<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Detection name: Trojan:PDF\/Sonbokli.A!cl<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxps:\/\/apple-locked[.]hopto[.]org\/_<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">File name: <em>SKM_20181105029929.pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: 5e7b2808a4ec71dd7b89463e30200d8576a73a50fe128106445f5a3db9f35b5d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"color: #000120;\">Detection name: Trojan:Script\/Foretype.A!ml<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxps:\/\/t[.]co\/QzKoqr4pd5<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">File name: <em>Remittance Invoice Advise!!.pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: e46566f58e8baed0789fe066cd69ecc0817d6b20faaea12b7ebbf06b940a5af4<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"color: #000120;\">Detection name: Trojan:Win32\/Spursint.R!cl<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxp:\/\/andreasucci[.]it\/admin\/!%23%23%23@!\/<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">File name: <em>Card Member Document.pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: eb1785f4cd4b5b814fd195ed2e2b844ddb5223f536e8e37368fdaea39dd8e242<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"color: #000120;\">Detection name: Trojan:Win32\/Spursint.P!cl<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxp:\/\/unspecified[.]biz\/uiudfg<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">File name: <em>BBVA_Justi.pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: 11b04f8716aff5de3f1131de16711f6051b8d73e9a6d94f137df26bf4c7c48cf<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Detection name: Trojan:Win32\/Spursint.P!cl<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxps:\/\/www[.]dropbox[.]com\/s\/lvhkev63o2w8t3q\/justificante.uue?dl=1<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">File name: <em>MAERSK Tracking Document .pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: 25247dda0a94d73d62e26707ed072beea3f8fc170087b30bc5709fb1aca7f9b9<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Detection name: Trojan:Win32\/Spursint.P!cl<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxps:\/\/dc[.]exa[.]unrc[.]edu[.]ar\/facas2015\/modules\/php\/maerskhwj.php?bayblade=dranzer<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>File name: Private71LScan.pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: 99ff3cd0c0e0acccdc81f8af39205bfadc2a37ea5216a10a7ca2a402a6115b56<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"color: #000120;\">Detection name: Trojan:Win32\/Sonbokli.A!cl<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxps:\/\/triplesixone[.]info\/tfds\/index.php?fruitly=mixer<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>File name: Great Rock Capital Proposal.pdf<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SHA-256: b8228fb05384fbe732dfe0390bd7ab78b662416652126cd88bc8163a5d8ba5d9<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"color: #000120;\">Detection name: Trojan:PDF\/Sonbokli.A!cl<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious URL: hxxps:\/\/superbdeal[.]site\/benz\/share<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"talk-to-us\">Talk to us<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Questions, concerns, or insights on this story? Join discussions at the&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-Advanced-Threat\/ct-p\/WindowsDefenderAdvanced\">Microsoft Defender ATP community<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Follow us on Twitter <a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>@MsftSecIntel<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.<\/p>\n","protected":false},"author":61,"featured_media":89064,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[89667,89570,89592],"footnotes":""},"post_tag":[],"threat-intelligence":[3736],"content-type":[3663],"job-role":[],"product":[],"topic":[3687],"coauthors":[1968],"class_list":["post-87451","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","threat-intelligence-social-engineering-phishing","content-type-research","topic-threat-intelligence","review-flag-1694638272-264","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-machi-1694638272-641","review-flag-ml-1694638272-297","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tackling phishing with signal-sharing and machine learning | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tackling phishing with signal-sharing and machine learning | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-19T16:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-16T16:36:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"440\" \/>\n\t<meta property=\"og:image:height\" content=\"268\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Defender Security Research Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Defender Security Research Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/windows-defender-research\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Defender Security Research Team\"}],\"headline\":\"Tackling phishing with signal-sharing and machine learning\",\"datePublished\":\"2018-12-19T16:00:11+00:00\",\"dateModified\":\"2025-12-16T16:36:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/\"},\"wordCount\":1284,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png\",\"articleSection\":[\"AI and machine learning\",\"Cybersecurity\",\"Microsoft Graph Security API\",\"Microsoft Intelligent Security Graph\",\"Office 365 Security\",\"Phishing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/\",\"name\":\"Tackling phishing with signal-sharing and machine learning | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png\",\"datePublished\":\"2018-12-19T16:00:11+00:00\",\"dateModified\":\"2025-12-16T16:36:26+00:00\",\"description\":\"Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png\",\"width\":440,\"height\":268,\"caption\":\"Enriching detection with URL and domain reputation with Officer 365 ATP intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tackling phishing with signal-sharing and machine learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/a385e64377ec1eb81d3bd7f9839f060b\",\"name\":\"Microsoft Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=gea2dea4ce5dbbbe4077dc25334909eb7\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/mssecurity\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tackling phishing with signal-sharing and machine learning | Microsoft Security Blog","description":"Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/","og_locale":"en_US","og_type":"article","og_title":"Tackling phishing with signal-sharing and machine learning | Microsoft Security Blog","og_description":"Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/","og_site_name":"Microsoft Security Blog","article_published_time":"2018-12-19T16:00:11+00:00","article_modified_time":"2025-12-16T16:36:26+00:00","og_image":[{"width":440,"height":268,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png","type":"image\/png"}],"author":"Microsoft Defender Security Research Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Defender Security Research Team","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/windows-defender-research\/","@type":"Person","@name":"Microsoft Defender Security Research Team"}],"headline":"Tackling phishing with signal-sharing and machine learning","datePublished":"2018-12-19T16:00:11+00:00","dateModified":"2025-12-16T16:36:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/"},"wordCount":1284,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png","articleSection":["AI and machine learning","Cybersecurity","Microsoft Graph Security API","Microsoft Intelligent Security Graph","Office 365 Security","Phishing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/","name":"Tackling phishing with signal-sharing and machine learning | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png","datePublished":"2018-12-19T16:00:11+00:00","dateModified":"2025-12-16T16:36:26+00:00","description":"Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/12\/enrichment-with-email-3-blog.png","width":440,"height":268,"caption":"Enriching detection with URL and domain reputation with Officer 365 ATP intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/12\/19\/tackling-phishing-with-signal-sharing-and-machine-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Tackling phishing with signal-sharing and machine learning"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/a385e64377ec1eb81d3bd7f9839f060b","name":"Microsoft Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=gea2dea4ce5dbbbe4077dc25334909eb7","url":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g","caption":"Microsoft Security"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/mssecurity\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/87451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=87451"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/87451\/revisions"}],"predecessor-version":[{"id":144585,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/87451\/revisions\/144585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/89064"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=87451"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=87451"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=87451"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=87451"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=87451"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=87451"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=87451"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=87451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}