Research the evolution of malware attacks using Microsoft programs. Summarize
some large and small attacks along with how they were executed and the results they had.
Analyze the impact these types of attacks have had not only of the victims, but also the
reputation of Microsoft and monetary impact. Describe different patches and security
procedures that have come about in order to better secure Microsoft programs and user
as a response to these types of malware attacks
Some deliverables I will be using are graphs illustrating the amount of users who
have become victims to these types of attacks and the cost they have had. If I can find a
table with the different malwares, I will also be using that.
*
Introduction
1. History
behind malware and Microsoft programs
– history behind Microsoft programs and their evolution
– history behind malware and their evolution
2. How
Microsoft products have been used for malware
– at a minimum 3 different malware attacks that utilized
Microsoft programs
– Incorporate
a table that lists the different type of attacks
3. Malware
attacks using Microsoft products and their impact
– negative impacts; financially and reputation wise that
these attacks have had
– Incorporate
graphs or tables in this section
– If
possible, add the amount of money and personnel that have been used or added in
order to better protect Microsoft programs from being used and users as well
4. Protection
and security against malware attacks using Microsoft programs
– Have
a rough draft of different patches and security processes that have come about
as a result of these malware attacks
Conclusion
*
possible resources:
1. https://www.microsoft.com/en-us/microsoft-365-life-hacks/stories/looking-back-ten-years-microsoft-365
Microsoft
365. (2023, January 11). Looking back at 10 years of microsoft 365 making
history.
2. https://www.wps.com/blog/history-of-microsoft-office-a-comprehensive-guide/
Jasaitis,
A. (2023, August 25). History of Microsoft Office–A comprehensive guide: WPS
office blog. WPS Blog.
https://www.wps.com/blog/history-of-microsoft-office-a-comprehensive-guide/
3. https://www.ibm.com/blog/malware-history/
Schneider,
J. (2023, November 6). The history of malware: A Primer on the evolution of
cyber threats. IBM Blog. https://www.ibm.com/blog/malware-history/
4. https://www.fortinet.com/blog/threat-research/evolution-of-malware
Saengphaibul,
V. (2022, March 15). A brief history of the evolution of malware: FortiGuard
Labs . Fortinet Blog.
https://www.fortinet.com/blog/threat-research/evolution-of-malware
5. https://www.hackread.com/microsoft-office-malware-attacks-exploite-flaws/
Ahmed, D.
(2023, October 8). Microsoft Office most exploited software in malware
attacks – report. Hackread.
Microsoft Office Most Exploited Software in Malware Attacks – Report
6. https://perception-point.io/guides/malware/10-malware-examples-and-6-world-famous-attacks/
10
malware examples and 6 world famous attacks. Perception Point. (2023,
November 22).
https://perception-point.io/guides/malware/10-malware-examples-and-6-world-famous-attacks/
7. https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/
Msrc.
(2024, January 19). Microsoft. MSRC Blog | Microsoft Security Response
Center.
https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/
8.
Wingfield,
N. (2017, May 16). In ransomware attack, where does Microsoft’s
responsibility lie? The New York Times.
9. https://learn.microsoft.com/en-us/entra/architecture/protect-m365-from-on-premises-attacks
Ricketts,
J., Lamos, B., Buck, A., & Flores, J. (2023, October 23). Protecting
Microsoft 365 from on-premises attacks – microsoft entra. Microsoft Entra |
Microsoft Learn.
https://learn.microsoft.com/en-us/entra/architecture/protect-m365-from-on-premises-attacks
10. https://www.ncsc.gov.uk/guidance/macro-security-for-microsoft-office
Macro Security for
Microsoft Office. NCSC. (2023, October 11). https://www.ncsc.gov.uk/guidance/macro-security-for-microsoft-office