Menu
Malware infections tripled in late 2013, Microsoft finds

Malware infections tripled in late 2013, Microsoft finds

The rise is attributed to 'Rotbrow,' a type of malware that downloads other bad programs

A three-fold increase in Microsoft Windows computers infected with malicious software in late 2013 came from an application that was for some time classified as harmless by security companies.

The finding comes as part of Microsoft's latest biannual Security Intelligence Report (SIR), released on Wednesday, which studies security issues encountered by more than 800 million computers using its security tools.

In the third quarter of 2013, an average of 5.8 Windows computers out of every 1,000 were infected with malware, said Tim Rains, director of Microsoft's Trustworthy Computing division, which tracks security trends targeting the company's widely used products. That jumped to about 17 computers per 1,000 for the last quarter of the year.

Rains attributed the rise to malware called "Rotbrow." The program masquerades as a browser add-on called "Browser Protector" and is supposedly a security product, Rains said by phone Wednesday. Rotbrow was found on about 59 of every 1,000 computers using its security products, he said.

For some time, computer security companies didn't classify Rotbrow as malicious software. Rotbrow is known as a "dropper," with capabilities to download other software on a computer. It didn't initially download malware to computers it was installed on, Rains said.

But then Rotbrow started downloading malicious browser extensions. Microsoft noticed the change and alerted other security companies, which then began blocking it.

The tactic, which had been used by fake antivirus programs in the past, meant that Rotbrow was already installed on a huge number of computers.

"I would characterize it as a low and slow attack," Rains said. "They were patient and waited a long time before they started to distribute malicious stuff. I think they gained a lot of people's trust over time."

Rotbrow often distributes Sefnit, a type of malicious botnet code, which can subsequently download other harmful programs to a computer such as those involved in click fraud. Sefnit has also been linked to "ransomware," which is malware that encrypts a person's files and demands payment.

Microsoft added detection for Rotbrow in its Malicious Software Removal Tool (MSRT) last December after it raised suspicion.

Overall, Microsoft's latest report concluded that security improvements in Windows such as ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention) have made it much more difficult to exploit known vulnerabilities. The report also said the number of vulnerabilities in Microsoft products that can be remotely exploited has fallen by 70 percent between 2010 and 2013.

"We are really trying to raise the cost of exploitation," Rains said. "It's not impossible to exploit, just hard. They have to put in the extra time, extra cost.

As a result, attackers are increasingly trying to just trick people into downloading their malware by bundling it with legitimate programs or music, he said.

The latest report does not include data on the zero-day vulnerability in Internet Explorer that Microsoft released an emergency patch for on Monday. The flaw, which affects IE 6 through IE 11, could allow attackers to execute code remotely on a compromised computer if the user views an infected web page using the browser.

Rains said "time will tell" if its next report shows a rise in infections due to the bug. But Microsoft believes the quick release of a patch and fact users have to be lured to a malicious website mitigates the risk.

"I don't think we will see an uptick [in infections] given the quick response and the type of vulnerability that is," Rains said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Microsoftsecurity

Featured

Slideshows

Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Top 15 Kiwi tech storylines to follow in 2017

Top 15 Kiwi tech storylines to follow in 2017

​The New Year brings the usual new round of humdrum technology predictions, glaringly general, unashamedly safe and perpetually predictable. But while the industry no longer sees value in “cloud is now the norm” type projections, value can be found in following developments of the year previous, analysing behaviours and patterns to formulate a plan for the 12 months ahead. Consequently, here’s the top Kiwi tech storylines to follow in 2017...

Top 15 Kiwi tech storylines to follow in 2017
Show Comments