Security Intelligence Report Infographic 2018 EN US PDF
Security Intelligence Report Infographic 2018 EN US PDF
Easy Mark
Botnets Ransomware
Attack Methods
Botnets
Bots are programs that allow attackers to infect and take control of computers, and
botnets are a network of those bots controlled by command-and-control (C&C) servers.
On November 29, 2017, Microsoft’s Digital Crimes Unit tackled a leading botnet that
infected more than 23 million IP addresses: Gamarue. Find out more in the full report.
20,000,000
SECURIT Y
15,000,000 RECOMMENDATIONS
0
December January February
2017 2018 2018
Phishing
Broad-based phishing and spear phishing both rely on what’s most often cited as
security’s weakest link: people. Phishing can take many shapes, including:
180,000,000–200,000,000
Approximate number of phishing emails Microsoft
detected each month, over three months
Domain Links to fake (November 2017 - January 2018).
impersonation SaaS apps
Cloud apps
Cloud app adoption is rising to support business productivity, but a lack
of security infrastructure could be inadvertently compromising data.
0 20 40 60 80 100
Yes No
Ransomware
Ransomware infects and encrypts files (and sometimes entire disks) to prevent access
until a ransom is paid—and there’s no guarantee victims will regain access.
Ransomware made a real-world impact in 2017, bringing down critical services like
hospitals, transportation, and traffic systems. Here are few of the unprecedented and
devastating ransomware families responsible for the 2017 attacks:
www.microsoft.com/sir
© 2018 Microsoft Corporation. All rights reserved. This document is for informational purposes only.