Feeds

Microsoft says US is top malware target

The United States of infected PCs

The Essential Guide to IT Transformation

Windows users based in the United States are the most likely to benefit from Microsoft's malicious software removal tool, which has removed malware from nearly 2.2 million US machines, more than the other nine top countries combined.

Over the same period, the MSRT has disinfected 383,378 machines in China, 282,152 in Brazil, 278,207 in the UK, and 262,539 in Korea, according to statistics Microsoft published here. In all, 2.18 million US-based machines were cleaned, compared with 1.87 million machines based in the other countries contained on the top-10 list.

"The US is at the top of this list as it is by default the top target for most of the malicious code out there," Marian Radu and Scott Wu, two members of the Microsoft Malware Protection Center wrote. "China and Brazil are actually a totally different story. While China is a top target for online games password stealers and the black market associated with it, Brazil is a prime goal for another breed of password stealers: those targeting bank accounts. Given these locations, it should come as no surprise that the top prevalent threats are what they are."

In August, Microsoft added a new trojan called Win32/FakeRean to its malware hit list. In the first two weeks the rogue anti-virus program was targeted, it was removed from 162,328 machines. A family of worms known as Win32/Taterf ranked No. 1, with 463,000 PCs cleaned. The worms spread over mapped drives in order to steal login and account details for popular online games.

Win32/Renos, another rogue anti-virus program, and a data-stealing trojan known Win32/Alureon, ranked third and fourth, with 228,973 and 211,441 machines purged respectively. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.