Worms infesting computers worldwide: Microsoft

Relax News
Tuesday 03 November 2009 01:00 GMT
Comments
(Tan Kian Khoon)

Your support helps us to tell the story

This election is still a dead heat, according to most polls. In a fight with such wafer-thin margins, we need reporters on the ground talking to the people Trump and Harris are courting. Your support allows us to keep sending journalists to the story.

The Independent is trusted by 27 million Americans from across the entire political spectrum every month. Unlike many other quality news outlets, we choose not to lock you out of our reporting and analysis with paywalls. But quality journalism must still be paid for.

Help us keep bring these critical stories to light. Your support makes all the difference.

A Microsoft security report released Monday warns that cyber crooks are digging into computers for weak spots to penetrate with worms -- malicious software that steals control or data.

Rogue security software remained the top hacker threat to computers during the first half of this year, but the number of infections was dropping while penetrations by worms doubled, according to the Security Intelligence Report.

"We still see rogue security software in high volume but not on the rise," Microsoft Malware Protection Center principal architect Jeff Williams told AFP. "What is on the rise is resurgence of worm activity, particularly Conficker and Taterf."

Worms are programmed to replicate themselves, wriggling from machine to machine by hiding in legitimate applications or piggy-backing on USB drives or other portable data storage devices.

Rogue security software, or "scareware," typically spreads by tricking people with pop-up boxes bearing bogus alerts that their machines are infected.

Spooked computer users are then enticed to pay for applications to fix the supposed computer problems. People that fall for the scam wind up paying hackers; providing them credit card information, and installing malware.

Automated scareware blocking in Web browsers and efforts by law enforcement agencies to crack down on companies peddling rogue security software has helped curb the threat.

"When selecting an anti-virus product, do it from a proven provider, not someone you never heard of who just pops up on your screen," Williams said.

Improving defenses of computers was seen as a reason hackers are reverting to worms, which were a top bane about a decade ago.

"We see a rise again in worms as profit-motivated criminals are digging deeper, finding more arcane vulnerabilities to execute remotely," Williams said.

A Conficker worm that plagued the Internet at the start of the year was so pernicious that a task force to combat it was formed by computer software and security firms.

Conficker and Taterf worms have reportedly wriggled into millions of machines.

One of the troublesome ways both worms spread is by stowing away on thumb drives, which are becoming increasingly popular vehicles for people to move music, videos, games, files or other data between computers.

"Think about how and where people play online games," Williams said. "What you tend to see is people remove a drive from home or an Internet kiosk and take it back into the enterprise (workplace)."

A memory stick carried in by a worker tends to bypass computer security systems designed to guard against hackers breaking in from outside the walls of a business, according to Williams.

Businesses should establish security protocols for removable media drives, and have new arrivals automatically scanned for malware, Microsoft recommends.

"The criminals out there are becoming more overt, more malicious and more direct in their attacks," Williams said.

"That emphasizes the need for multi-layer protections. It is great we have anti-virus software to remove the threats, but clearly it is better to prevent the threat from getting in."

Cyber criminals are moving with increasing speed when it comes to reverse engineering patches released to fix vulnerabilities in software programs or operating systems, according to Microsoft.

Hackers dissect patches to identify weakness being repaired, then craft malicious code to take advantage of flaws in machines with software that isn't kept up-to-date.

"A patch is released and that is what starts these days of risk" Williams said.

"There is a window of vulnerability, so we need to close that window more quickly" he said. "Making sure you are up-to-date on security updates is one strong method of protecting yourself against attack."

Microsoft's security report is based on data from "billions of scans a day" in more than 200 regions of the world.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in