Feeds

Microsoft says US is top malware target

The United States of infected PCs

5 things you didn’t know about cloud backup

Windows users based in the United States are the most likely to benefit from Microsoft's malicious software removal tool, which has removed malware from nearly 2.2 million US machines, more than the other nine top countries combined.

Over the same period, the MSRT has disinfected 383,378 machines in China, 282,152 in Brazil, 278,207 in the UK, and 262,539 in Korea, according to statistics Microsoft published here. In all, 2.18 million US-based machines were cleaned, compared with 1.87 million machines based in the other countries contained on the top-10 list.

"The US is at the top of this list as it is by default the top target for most of the malicious code out there," Marian Radu and Scott Wu, two members of the Microsoft Malware Protection Center wrote. "China and Brazil are actually a totally different story. While China is a top target for online games password stealers and the black market associated with it, Brazil is a prime goal for another breed of password stealers: those targeting bank accounts. Given these locations, it should come as no surprise that the top prevalent threats are what they are."

In August, Microsoft added a new trojan called Win32/FakeRean to its malware hit list. In the first two weeks the rogue anti-virus program was targeted, it was removed from 162,328 machines. A family of worms known as Win32/Taterf ranked No. 1, with 463,000 PCs cleaned. The worms spread over mapped drives in order to steal login and account details for popular online games.

Win32/Renos, another rogue anti-virus program, and a data-stealing trojan known Win32/Alureon, ranked third and fourth, with 228,973 and 211,441 machines purged respectively. ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?