Microsoft 11735 Published by

This paper will provide examples of poignant social engineering ‘exploits’ over the past few years and attempt to construct a model, using telemetry from Microsoft’s Windows Malicious Software Removal Tool, that can predict the prevalence of a specific social engineering threat based on its characteristics and appeal to the user.

Behavioral Modeling of Social Engineering-Based Malicious Software