Feeds

Win7 machines harder hit by infection as VXers change tactics

Java-based exploits and phishing on social networks dominate

Providing a secure and efficient Helpdesk

Win7 infection rates rose during the second half of 2010 even as malware hit rates on XP machines declined, according to official statistics from Microsoft.

The latest edition of Microsoft's Security Intelligence Report shows an infection rate of four Win7 PCs per 1,000 in the second half of 2010, up from three Win7 PCs per 1,000 during the first half of 2010. The rise of more than 30 per cent contrasts with a drop of the infection rate, albeit from a much higher starting point, for older and less secure machines running Windows XP. Both figures were taken from scans using Microsoft's Malicious Software Removal Tool (MSRT).

Infection rates for Win XP SP3 machines fell from around 18 per 1,000 to 14 per 1,000 PCs. Machines running XP SP3 fared better than computers running only XP SP2, where infection rates dropped from around 20 per 1,000 to 18 per 1,000 over the same period. Infection rates on Vista machines also dropped from around 11 per 1,000 to 10 per 1,000 or slightly less, for machines running SP2.

As Microsoft points out, Win7 machines have more built-in security protection and are more immune from security attacks than machines running Vista or Win XP. However this security performance boost is decreasing, possibly as a result in a change of tactics by malware-peddling baddies.

Microsoft records a massive fourteen-fold rise in Java-based attacks during Q3 2010, as miscreants sought to exploit a pair of vulnerabilities prevalent at the time. These two vulnerabilities (CVE-2008-5353 and CVE-2009-3867) accounted for 85 per cent of all Java exploits detected in the second half of 2010. Operating system exploits, which have declined over recent months, increased significantly in Q3 2010, primarily because of exploitation of two Windows vulnerabilities, Redmond's security watcher notes.

The period also saw an enormous increase of 1,200 per cent in phishing using social networking as the lure, as social networks become lucrative hotbeds for criminal activity. Phishing using social networking as a lure increased from a low of 8.3 per cent of all phishing attacks in January to a high of 84.5 per cent in December 2010.

In addition, the Security Intelligence Report also charts a big rise in adware-based attacks. Two new strains of adware, JS/Pornpop and Win32/ClickPotato, were major contributors to this increase. Both strains of malware generate pop-ups on infected machines. In the case of Pornpop these pop-ups advertise smut sites.

Microsoft's full 89-page report can be downloaded here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.