Microsoft data shows Web attacks on the rise
Tactics changed in the latter half of '07
IDG News Service - Criminals changed tactics in the last six months of 2007, dropping malicious e-mail in favor of Web-based attacks, according to data reported to Microsoft Corp. by Windows users.
The company saw the number of Trojan horse downloader programs it removed from Windows machines jump by 300%, according to Jimmy Kuo, principal architect with Microsoft's Malware Protection Center. These programs masquerade as legitimate pieces of software, but once installed they then download malicious software such as spyware or adware onto the victim's computer. They are typically installed via the Web.
The shift to the Web has been forced onto criminals, as system administrators have become better at blocking executable files from being sent via e-mail. So instead of sending their malicious software directly via e-mail, the bad guys are now being forced to send out spam messages that trick victims into visiting the malicious Web sites. "Executables are often being stripped completely regardless of what they are," Kuo said.
Many companies compile data on Web attack trends, but Microsoft's data is the most comprehensive. It's based on data from the approximately 450 million computers that run the Malicious Software Removal Tool that ships with Windows.
Kuo said that there are still a lot of infected Windows boxes out there, although there are fewer than some have reported. On average, Microsoft removed malware from one out of every 123 computers it inspected each month during the period. In the U.S., that number was 1 in every 112. Japan was the least infected country, with malware found on just one in 685 machines.
Microsoft published its findings Monday in its Microsoft Security Intelligence Report, Volume 4.
Other data from Microsoft's report:
- The total number of malware items removed by Microsoft's tool was up 55% from the first six months of 2007.
- Adware is still the most common form of unwanted software, and was up 66% in the second half of the year to 34.3 million detections. The top piece of adware for the period was Win32/Hotbar, which installs an Internet Explorer toolbar that spews pop-up ads onto the PC.
- Between 75% and 80% of phishing pages tracked by the Microsoft Phishing Filter were in English, and phishing is now moving from e-mail onto social networks.
- Rogue security software is on the rise. The most widely spotted of these bogus or malicious programs that pretend to protect PCs was Win32/Winfixer. It popped up five times as frequently as its nearest rival.
- Microsoft fixed fewer bugs in 2007 than in 2006. The company released 69 security updates, fixing 100 bugs in 2007. That's down nearly 30% from the 142 vulnerabilities it fixed in 2006.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts