Microsoft warns against rogue security apps

Keep your street smarts on the Internet, according to a new report from Microsoft. Although some areas of security risk have shown improvement, threats from rogue security software to phishing scams are on the rise.

Microsoft today issued volume 6 of the Security Intelligence Report, detailing threats posed by rogue security software, browser-based exploits, popular document format exploits and security breaches.

According to the report, rogue security software uses “fear and annoyance tactics” to convince people to pay for bogus versions of software that will protect them from malware. This sort of threat has been on the rise during the past few years.

The report also offered analysis of browser-based exploits during the period between June and December 2008. Microsoft assessed a sample of data from incidents reported by customers, malicious code reports and Microsoft Windows error reports. The most common exploits occurred in U.S. English, about 32.4 percent, followed by Chinese, which had 25.6 percent of all incidents.

Browser-based attacks were much more likely to occur on PCs running the Windows XP operating system, about 40.0 percent of the total. By contrast, Windows Vista-operated machines accounted for just 5.5 percent of these attacks.

The report also lists the top 10 browser-based vulnerabilities attacked on computers running Windows XP in the second half of 2008, six of which were found in Microsoft software.

Hackers are now more likely to use common file formats as transmission vectors for their attacks. E-mail and instant messaging programs allow Microsoft Office and Adobe Portable Document Format (PDF) files as attachments, so they have become a target for the creators of malicious exploits, the report said. Use of PDF files as a transmission vehicle for attacks rose sharply in the second half of 2008, with attacks in July alone amounting to more than twice as many as in the first half of 2008.

The report also looked at security breach trends as provided by the Open Security Foundation’s (OSF) Data Loss Database. The main cause of data loss is the theft of equipment such as laptops, which account for 33.5 percent of all data loss incidents reported. Security breaches from hacking or malware attacks accounts for less than 20 percent of the total loss of data.

And although the Web is by definition worldwide, not all Internet security threats are global, the report said. Many threats are dependent on common language and cultural factors. The banking malware that plagues Brazil, for instance, is not common in South Korea, which is troubled by viruses such as Win32/Virut and Win32/Parite.

Finally, home PC users need to be especially vigilant, the report said. Home computers are more likely than corporate computers to encounter trojans, trojan downloaders and droppers, adware and exploits.

And there’s a reason your spam filter is always full. More than 97 percent of e-mail messages sent over the Internet are unwanted, the report said. They either have malicious attachments or are phishing attacks or spam, most of which (72.2 percent) consists of product advertisements.

About the Author

Trudy Walsh is a senior writer for GCN.

inside gcn

  • secure cloud choices

    Public cloud security doesn't end with the cloud provider

Reader Comments

Thu, Apr 9, 2009 Eirik Iverson Chantilly Virginia

Clearly we need better protection from malware attacks than what most people have today. These legacy tools operate by looking at all of the billions of inbound communications and files and comparing them against a list of known attacks. This "list" is growing at an alarming rate per day because malware-makers can easily alter their code slightly such that a new entry must be added to the "list" to detect it. A different approach is needed. Generally, instead of distrusting the endless variety of inbound communications and files, users need tools that distrust the applications that process these inbound communications and files instead. Most such products are too complex and tedious. Ultimately, most consumers and businesses manage to utilize only a fraction of their potential protection. I elaborate more on evaluating new types of protections below: http://www.securitynowblog.com/endpoint_security/hips-security-software-trial-necessary-difficult If you're not convinced of the need for new protections, check this one out: http://www.securitynowblog.com/endpoint_security/secunia_report_signature-based_antivirus_misses_most_unknown_malware There are many other related posts about PC protection too. Eirik

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group