www.microsoft.com Open in urlscan Pro
2a02:26f0:11a:39f::356e  Public Scan

Submitted URL: https://go.microsoft.com/fwlink/?linkid=37020&name=Program:Win32/Wacapew.C!ml&threatid=265744&enterprise=1
Effective URL: https://www.microsoft.com/en-us/wdsi/threats
Submission: On October 17 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

Name: searchFormGET https://www.microsoft.com/en-us/search/explore

<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/search/explore" method="GET"
  data-seautosuggest="{&quot;queryParams&quot;:{&quot;market&quot;:&quot;en-us&quot;,&quot;clientId&quot;:&quot;7F27B536-CF6B-4C65-8638-A0F8CBDFCA65&quot;,&quot;sources&quot;:&quot;Iris-Products,DCatAll-Products,Microsoft-Terms&quot;,&quot;filter&quot;:&quot;+ClientType:StoreWeb&quot;,&quot;counts&quot;:&quot;1,5,5&quot;},&quot;familyNames&quot;:{&quot;Apps&quot;:&quot;App&quot;,&quot;Books&quot;:&quot;Book&quot;,&quot;Bundles&quot;:&quot;Bundle&quot;,&quot;Devices&quot;:&quot;Device&quot;,&quot;Fees&quot;:&quot;Fee&quot;,&quot;Games&quot;:&quot;Game&quot;,&quot;MusicAlbums&quot;:&quot;Album&quot;,&quot;MusicTracks&quot;:&quot;Song&quot;,&quot;MusicVideos&quot;:&quot;Video&quot;,&quot;MusicArtists&quot;:&quot;Artist&quot;,&quot;OperatingSystem&quot;:&quot;Operating System&quot;,&quot;Software&quot;:&quot;Software&quot;,&quot;Movies&quot;:&quot;Movie&quot;,&quot;TV&quot;:&quot;TV&quot;,&quot;CSV&quot;:&quot;Gift Card&quot;,&quot;VideoActor&quot;:&quot;Actor&quot;}}"
  data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
  data-m="{&quot;cN&quot;:&quot;GlobalNav_Search_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c9c4c1m1r1a1&quot;}" aria-expanded="false">
  <div class="x-screen-reader" aria-live="assertive"></div>
  <input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-autocomplete="list" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search"
    name="q" role="combobox" placeholder="Search Microsoft.com" data-m="{&quot;cN&quot;:&quot;SearchBox_nav&quot;,&quot;id&quot;:&quot;n1c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" data-toggle="tooltip"
    data-placement="right" title="Search Microsoft.com">
  <button id="search" aria-label="Search Microsoft.com" class="c-glyph" data-m="{&quot;cN&quot;:&quot;Search_nav&quot;,&quot;id&quot;:&quot;n2c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" data-bi-mto="true"
    aria-expanded="false" disabled="disabled">
    <span role="presentation">Search</span>
    <span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip">Search Microsoft.com</span>
  </button>
  <div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group">
    <ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
      data-m="{&quot;cN&quot;:&quot;search suggestions_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}"></ul>
    <ul class="c-menu f-auto-suggest-no-results" aria-hidden="true" data-js-auto-suggest-postion="default" data-js-auto-suggest-position="default" role="listbox">
      <li class="c-menu-item"> <span tabindex="-1">No results</span></li>
    </ul>
  </div>
</form>

Name: form1

<form id="threatEncyclopedia" class="c-search" autocomplete="off" name="form1" target="_self">
  <input data-m="{&quot;cN&quot;:&quot;Threat&quot;,&quot;pid&quot;:&quot;search-field&quot;,&quot;id&quot;:&quot;nn1m1r1a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;m1r1a2&quot;}" aria-label="Enter your search" id="Threat" type="search"
    name="search-field" role="searchbox" placeholder="Search encyclopedia">
  <button class="c-glyph" aria-label="Search" id="Search" name="search-button" title="Search">
    <span class="x-screen-reader">Search</span>
  </button>
</form>

Name: form1

<form name="form1" id="mapDropdownDiv" target="_self" data-grid="col-4">
  <div id="map-select" class="c-select f-border f-scroll">
    <select data-m="{&quot;cN&quot;:&quot;dropdown&quot;,&quot;pid&quot;:&quot;Select a region&quot;,&quot;id&quot;:&quot;nn1m1r2a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;m1r2a2&quot;}" id="dropdown" aria-label="Select a region"></select>
  </div>
</form>

Name: form1

<form name="form1" id="industryDropdownDiv" target="_self" data-grid="col-4">
  <div id="industry-select" class="c-select f-border f-scroll">
    <select data-m="{&quot;cN&quot;:&quot;industryDropdown&quot;,&quot;pid&quot;:&quot;Select an industry&quot;,&quot;id&quot;:&quot;nn1m1r4a2&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;m1r4a2&quot;}" id="industryDropdown"
      aria-label="Select an industry"></select>
  </div>
</form>

Text Content

Skip to main content
Microsoft
Microsoft Security Intelligence
Microsoft Security Intelligence
Microsoft Security Intelligence
 * Home
 * Threats
 * Blogs
 * Downloads
    * Updates Updates
      * Antimalware updates
      * Definition change log
    * Security software Security software
      * Windows security
      * Microsoft Defender ATP
      * Microsoft Threat Protection
    * Cleanup tools Cleanup tools
      * Malicious Software Removal Tool (MSRT)
      * Safety Scanner
      * Microsoft Defender Offline

 * Submissions
    * Submit a file
    * View submission history
    * Report unsafe site
    * Attack surface reduction

 * Help
    * Safety tips Safety tips
      * Sources of infection
      * Avoid tech support scams
      * Troubleshoot detection and removal
      * Up-to-date software
    * Developer resources
    * Our methodologies Our methodologies
      * Threat naming
      * Threat identification criteria
    * Security industry alliances

 * More

 * All Microsoft
   
   
    * GLOBAL
      
      * Microsoft Security
      * Azure
      * Dynamics 365
      * Microsoft 365
      * Microsoft Teams
      * Windows 365
    * Tech & innovation Tech & innovation
      * Microsoft Cloud
      * AI
      * Azure Space
      * Mixed reality
      * Microsoft HoloLens
      * Microsoft Viva
      * Quantum computing
      * Sustainability
    * Industries Industries
      * Education
      * Automotive
      * Financial services
      * Government
      * Healthcare
      * Manufacturing
      * Retail
      * All industries
    * Partners Partners
      * Find a partner
      * Become a partner
      * Partner Network
      * Find an advertising partner
      * Become an advertising partner
      * Azure Marketplace
      * AppSource
    * Resources Resources
      * Blog
      * Microsoft Advertising
      * Developer Center
      * Documentation
      * Events
      * Licensing
      * Microsoft Learn
      * Microsoft Research
    * View Sitemap


Search Search Microsoft.com
 * No results

Cancel 0 Cart 0 items in shopping cart
Sign in
Search


GLOBAL THREAT ACTIVITY

Countries or regions with the most malware encounters in the last 30 days







LIVING OFF THE LAND: ATTACKS THAT BARELY TOUCH THE DISK


RUNNING CODE WITH SYSTEM TOOLS

Sophisticated attacks avoid dropping files and instead rely on system tools to
run malicious code directly from remote or hidden sources. The absence of files
leaves AV scanners without the necessary triggers and forensics without
persistent artifacts to recover. While security solutions have evolved, many
don’t check memory or review behaviors at runtime. Some rely on static
approaches that don’t dynamically recognize new attack methods.
Read about fileless attacks and defenses


FILELESS IN MORE WAYS THAN ONE

Attacks can go fileless in many ways. Attackers often use scripts, but they also
attempt to inject code into memory, hijack COM objects, and even insert
malicious code into firmware. Although these fileless techniques have figured in
targeted attacks, they have become more common in commodity malware campaigns.
Learn about fileless techniques


PROTECT WITH MICROSOFT DEFENDER FOR ENDPOINT

Microsoft Defender for Endpoint provides several layers of defenses, including
next-generation antivirus protection powered by behavior monitoring and runtime
script analysis. Both AV and EDR sensors use machine learning algorithms that
actively learn from both static and behavioral data to identify new fileless
attacks.

Experience Microsoft Defender for Endpoint in action


MOST AFFECTED INDUSTRIES

Reported enterprise malware encounters in the last 30 days







MALWARE

Ransomware
Malware naming
Antivirus benchmarks


ADVANCED ATTACKS

Supply chain attacks

Layered supply chain inception
AMSI reveals malicious macros


PHISHING

All about phishing

Mimicking local biz emails
AI vs social engineering
Follow us
 * 
 * 
 * 

What's new
 * Surface Laptop Studio 2
 * Surface Laptop Go 3
 * Surface Pro 9
 * Surface Laptop 5
 * Surface Studio 2+
 * Copilot in Windows
 * Microsoft 365
 * Windows 11 apps

Microsoft Store
 * Account profile
 * Download Center
 * Microsoft Store support
 * Returns
 * Order tracking
 * Certified Refurbished
 * Microsoft Store Promise
 * Flexible Payments

Education
 * Microsoft in education
 * Devices for education
 * Microsoft Teams for Education
 * Microsoft 365 Education
 * How to buy for your school
 * Educator training and development
 * Deals for students and parents
 * Azure for students

Business
 * Microsoft Cloud
 * Microsoft Security
 * Dynamics 365
 * Microsoft 365
 * Microsoft Power Platform
 * Microsoft Teams
 * Microsoft Industry
 * Small Business

Developer & IT
 * Azure
 * Developer Center
 * Documentation
 * Microsoft Learn
 * Microsoft Tech Community
 * Azure Marketplace
 * AppSource
 * Visual Studio

Company
 * Careers
 * About Microsoft
 * Company news
 * Privacy at Microsoft
 * Investors
 * Diversity and inclusion
 * Accessibility
 * Sustainability

English (United States) California Consumer Privacy Act (CCPA) Opt-Out Icon Your
Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon Your Privacy
Choices
 * Sitemap
 * Contact Microsoft
 * Privacy
 * Manage cookies
 * Terms of use
 * Trademarks
 * Safety & eco
 * Recycling
 * About our ads
 * © Microsoft 2023