Feeds

Microsoft says US is top malware target

The United States of infected PCs

Securing Web Applications Made Simple and Scalable

Windows users based in the United States are the most likely to benefit from Microsoft's malicious software removal tool, which has removed malware from nearly 2.2 million US machines, more than the other nine top countries combined.

Over the same period, the MSRT has disinfected 383,378 machines in China, 282,152 in Brazil, 278,207 in the UK, and 262,539 in Korea, according to statistics Microsoft published here. In all, 2.18 million US-based machines were cleaned, compared with 1.87 million machines based in the other countries contained on the top-10 list.

"The US is at the top of this list as it is by default the top target for most of the malicious code out there," Marian Radu and Scott Wu, two members of the Microsoft Malware Protection Center wrote. "China and Brazil are actually a totally different story. While China is a top target for online games password stealers and the black market associated with it, Brazil is a prime goal for another breed of password stealers: those targeting bank accounts. Given these locations, it should come as no surprise that the top prevalent threats are what they are."

In August, Microsoft added a new trojan called Win32/FakeRean to its malware hit list. In the first two weeks the rogue anti-virus program was targeted, it was removed from 162,328 machines. A family of worms known as Win32/Taterf ranked No. 1, with 463,000 PCs cleaned. The worms spread over mapped drives in order to steal login and account details for popular online games.

Win32/Renos, another rogue anti-virus program, and a data-stealing trojan known Win32/Alureon, ranked third and fourth, with 228,973 and 211,441 machines purged respectively. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.