Feeds

Malware lingers months on infected PCs

Resident evil

The essential guide to IT transformation

Malware stays around on infected PCs far longer than previously thought, according to the latest research from Trend Micro.

Previous estimates suggested that a compromised machine remains infected for approximately six weeks. Based on an analysis of around 100 million compromised IPs, Trend Micro concludes that many infected IPs are infected (or repeatedly infected) for more than two years, with a median infection length of 300 days. Four in five compromised machines are infected for more than a month.

A graph from Trend Micro suggests that if systems aren't disinfected quickly then infection tends to linger around indefinitely, possibly until the point users exchange compromised boxes for new machines.

Trend's study also looked at the botnet landscape. Three strains of botnet agent - Koobface, Zeus/Zbot and Ilomo/Clampi - are causing the most damage in terms of identity theft.

The Koobface botnet, for example, has co-opted around 51,000 machines into its ranks. Koobface uses between five and six command and control centers (C&C) to control these zombie clients at any one time. If a particular control domain is taken down by a particular provider, then botnet herders behind the malware establishes a new command outpost elsewhere. Between the middle of March and mid-August 2009, Trend Micro recorded around 46 Koobface control domains.

Trend's stats don't cover dormant infections by the Conficker worm. Stats from the Anti-Conficker Working Group suggest the malware is still resident on more than five million compromised machines. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.