Google: Attack code more likely on Microsoft IIS
Maybe the software's too easy to use, says one analyst
Last month, Google's Anti-Malware team looked at 70,000 domains that were either distributing malware or hosting attack code. "Compared to our sample of servers across the Internet, Microsoft IIS features twice as often as a malware-distributing server," wrote Google's Nagendra Modadugu, in a Tuesday blog posting.
Together, IIS (Internet Information Services) and Apache servers host about 89% of all Web sites, but collectively they're responsible for 98 percent of all Web-based malware. Google actually found an equal number of Apache and IIS Web sites hosting malicious software, but because there are so many more sites hosted by Apache servers (66% versus Microsoft's 23%) malicious sites make up a much larger percentage of all IIS servers.
Modadugu didn't draw any conclusions about whether this means that Microsoft servers are more likely to be hacked. "It is important to note that while many servers serve malware as a result of a server compromise... some servers are configured to serve up exploits by their administrators," Modadugu wrote.
Google also found that the malware server of choice varied from region to region. In China and South Korea, for example, the majority of malicious Web sites are running IIS. In the U.S., Russia, and Germany, however, Apache is the predominant malware server.
Modadugu speculated that the servers in China and South Korea may be running pirated software and, thus unable to get Microsoft's latest security updates.
According to one security researcher, the fact that IIS is so easy to use may account for Google's findings. It's easier to operate an IIS Web server than an Apache Web server, said Cesar Cerrudo, CEO of security research firm Argeniss, via instant message. "People who are not too skilled will install Windows and set up a Web server with weak configuration."
But Cerrudo said that more information would be required to draw any solid conclusions about the security of IIS. "The report says that 70,000 domains were examined but what about if 5,000 domains are in the same Web server in China?" he asked. "It's pretty easy playing with numbers and concluding. A lot of more data is needed to get the right conclusions."
Microsoft and Apache did not immediately respond to messages seeking comment.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts