Study: Malware persists on compromised machines

Eighty percent of computers that have been compromised are still infected after 30 days, and nearly 50 percent remain compromised after 10 months, according to an analysis released Wednesday by Trend Micro.

“When machines are compromised, they're compromised for a long time,” Dave Rand, CTO of Trend Micro, told SCMagazineUS.com Wednesday.

The machines remain undiscovered because they tend to stay under the radar – they don't do anything blatant, such as consuming system resources, that would tip off the victim, he said.

Also, because these infected PCs typically are part of botnets, they get new software revisions frequently, making them even more difficult to detect.

“One of the joys of having a botted machine is that they are updated regularly,” Rand said. “After the machine is infected, the auto-updates take over, and they are actually more efficient than many AV applications.”

In 2009, virtually all malware tracked by Trend Micro was used by cybercriminals to steal information, Rand wrote on the TrendLabs blog. The three most dangerous botnets in terms of information, financial and identity theft are Koobface, Zeus/Zbot and Ilomo/Clampi.

“The most important thing to recognize is that the machines will not fix themselves,” Rand said. “Someone has to look at the activity of these machines, and that should happen at the network level. We need to get better network tools into the hands of the enterprise.”

Likely a few hundred criminals have more than 100 million computers under their control, he said. This means that cybercriminals have more computing power at their disposal than the entire world's supercomputers combined.

“The internet is a dangerous place still,” Rand said. “We need to be aware that there is an incredible amount of information leaking out of the enterprise.”

close

Next Article in News

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.