Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Microsoft Windows Stats IT News Technology

Malware Scanner Finds 5% of Windows PCs Infected 232

BogenDorpher writes "According to statistics generated by Microsoft's new free malware scanning and scrubbing tool, Safety Scanner, one in every twenty Windows PCs are infected with malware. Microsoft's Safety Scanner was downloaded 420,000 times in just one week of availability and it cleaned up malware or signs of exploitation from more than 20,000 Windows PCs, according to statistics generated by Microsoft's Malware Protection Center. This resulted in an infection rate of nearly 5%." That seems an awfully low number, based on how quickly Windows machines are scanned for plunder after going online; though it's a few years old, here's a report that suggests (as of 2007, at least) a grace period of less than 10 seconds. That was just one instance, and an intentionally vulnerable machine, but have improvements in security software software, and in Windows itself, made things so much better since then?
This discussion has been archived. No new comments can be posted.

Malware Scanner Finds 5% of Windows PCs Infected

Comments Filter:
  • by betterunixthanunix ( 980855 ) on Saturday May 28, 2011 @10:06PM (#36277394)
    So a significant number of computers that downloaded the malware removal tool had malware on them. How is that surprising? Unless the installation of this tool is uniformly distributed amongst Windows users, which TFA is not entirely clear on...
    • by kvvbassboy ( 2010962 ) on Saturday May 28, 2011 @10:22PM (#36277450)

      What? I would say that it's the other way around. I would guess that the actual infection rates are higher. I bet that many of the people who didn't download this tool are probably the same people who are running an expired version of McAfee on their Windows XP without any Service Packs applied.

      Just recently, my parents were complaining about how their computer was behaving very slow and strangely. The number of malware, crapware and toolbars I had to uninstall via remote desktop using Teamspeak (we live on different continents) was enormous. Lol!

  • by Sir_Sri ( 199544 ) on Saturday May 28, 2011 @10:07PM (#36277396)

    "Safety Scanner, which replaced an older online-only tool, uses the same technology and detection signatures as Microsoft's free consumer-grade Security Essentials antivirus program and its Forefront Endpoint Protection product for enterprises."

    considering that by now everyone should run SOME anti virus, of which MSE is a legally free option, and that something which uses MSE's signature database finds 5% of machines have been compromised I don't think says much about computer security as a whole. Obviously there are a lot of users who *still* don't have anti virus software, which isn't really news. But MS can't exactly go including free anti virus in their OS without screams of anti trust.

  • Yes. (Score:5, Insightful)

    by artor3 ( 1344997 ) on Saturday May 28, 2011 @10:07PM (#36277398)

    That was just one instance, and an intentionally vulnerable machine [four years ago], but have improvements in security software software, and in Windows itself, made things so much better since then?

    Yes.

    Is it really surprising that computers with service packs, hot fixes, virus scanners, and firewalls are significantly more secure than those without?

    Of course, it's also worth noting that the real infection rate is probably at least a little bit higher. The people who don't download this particular scanner are the same ones who wouldn't download the aforementioned service packets, hot fixes, virus scanners, and firewalls. The unanswered, and perhaps unanswerable, question is how many such people are out there.

    • Exactly (Score:5, Interesting)

      by Giant Electronic Bra ( 1229876 ) on Saturday May 28, 2011 @10:23PM (#36277458)

      All this really 'proves' is that 95% of the people who are smart enough to download a free AV program didn't have an infection. Lets see, who uses those? Oh, I know! People who take precautions... When do they do it? BEFORE they get infected, lol.

      While it is an interesting datapoint to hobknob about, this actually says ZILCH about Windows infection rate, except it probably can't possibly be LESS than 5%.

      • Re: (Score:2, Insightful)

        by Anonymous Coward

        You can't draw that conclusion, either. You say that the people who download virus scanners are the smart ones who take precautions. That makes sense. But another big group that downloads virus scanners is the people who have reason to believe they have a virus. For all we know, 5% could be artificially LARGE because of that.

        We just can't draw these sorts of conclusions from this study.

      • All this really 'proves' is that 95% of the people who are smart enough to download a free AV program....

        This is a malware removal tool for people who already think they have a virus. See the Microsoft Safety Scanner [microsoft.com] main page. The very first words on that page are Do you think your PC has a virus? Not to mention it expires 10 days after download. Clearly not an AV for 'smart' people.

        ....except it probably can't possibly be LESS than 5%

        Considering MSS is for people who think they already have a virus, I think the only conclusion you can draw is that slashdot headlines are some of the most worthless pieces of shit on the internet (and that's saying soemthing)

    • by jhoegl ( 638955 )
      I find that saying an unprotected computer connected to the internet does not follow todays current norm.
      People have routers, or windows firewall (default), or both.
      To say a windows machine is vulnerable today is ignorant of the knowledge of hacking.
      As long as they have a firewall and dont open ports, they should be fine.

      Basic hacking requirement... you have to have an open port and a service on that port that has an exploit of some type.
      This is why website hacks, browser exploits, emails to get peopl
      • Re: (Score:2, Insightful)

        by Anonymous Coward
        Exactly, it wasn't AV that killed worms, it was the NAT routers which became standard PC equipment for non-techies between ~2002-2004.

        On the LAN side Windows can still be pwned as easily as before, you basically have instant shell access to any networked Windows machines.
        • On the LAN side Windows can still be pwned as easily as before, you basically have instant shell access to any networked Windows machines.

          [citation needed], even if it is with the default firewall turned off, for Vista and Windows 7.

      • by jhoegl ( 638955 )
        Why was I modded down?
    • Re:Yes. (Score:5, Insightful)

      by Penguinoflight ( 517245 ) on Saturday May 28, 2011 @11:19PM (#36277638) Journal

      Don't forget about those who have viruses but the malware removal tool was unable to either detect or remove them. If you can't churn out a virus that can beat the standard set by microsoft you're in the wrong business.

      • Not really. Malware aims a low hanging fruit and people taking active steps to protect their system are in all probability not worth the hassle (and downloading a onetime scanner is pretty active). The tool is also new so malwear writers probably haven't reacted to any great extent yet.

        • I'd wager the former, these people usually know how to circumvent new security features before they hit the street if they meddle with their business.

          The question is always, how much impact will a new security tool have on their business. If it's only a few "clued" people they use, they usually don't bother to find a way around it. If you look at contemporary malware and know a bit about security, it's actually boring. No "0day", no sophisticated self encryption, nothing really new and exciting. It's busine

  • datum (Score:2, Offtopic)

    by tverbeek ( 457094 )

    I fixed one this afternoon: my parent's WinXP computer. Adjust your stats accordingly.

  • by MacTO ( 1161105 ) on Saturday May 28, 2011 @10:19PM (#36277442)

    Maybe the number is accurate, maybe it isn't. But the one thing that strikes me is that this is not an entirely random survey since there are too many factors that can affect the sampling. Examples: people who do not update their software (including but not limited to this scanner) are probably more likely to have an infected machine, making the number low. Yet institutional PCs that are professionally managed (and are likely to use third party solutions) are probably less likely less likely to be infected, making the number high. So that 5%, as good or as bad as it may sound to you, is actually just a number thrown around by the marketing department.

  • "as of 2007" (Score:5, Informative)

    by QuasiSteve ( 2042606 ) on Saturday May 28, 2011 @10:24PM (#36277466)

    Honestly? "as of 2007"? In computer terms, that's several lifetimes.

    Not only that, but just because the news article linked to has 2007 at the top, doesn't mean the findings were from 2007. The news article in which the author "just read an incredible scary article" links to said incredible scary article - http://news.bbc.co.uk/2/hi/programmes/click_online/4423733.stm [bbc.co.uk] - from 2005. So not only was the news article writer 2 years behind the times, you're now suggesting that we should believe that you find it incredulous that things may have improved in 6 years' time?

    In that time Windows 7 and Vista have been released - both with far better security models out of the box. Even Windows XP saw a reasonable update with SP3.

    Then again, by April 2005, SP2 was also distributed and guess what it enabled by default? Windows Firewall. The worm in the original article, Sasser, would not have gotten very far.

    Then again, Sasser would not even have been on the system if they bothered to install the update that fixed the hole that Sasser would eventually exploit.

    It's just not a very convincing example to begin with, and certainly not one you should be citing 6 years later.

    • On the one hand, pulling out the dead horse that is "X seconds to XP infection" and beating on it in 2011 is a new low. Even for Slashdot. On the other hand, I wouldn't be caught dead with Windows XP in this day and age even with all the patches.

      Malware authors know the insides of XP so well that you have to do so many things to make a secure windows XP build that it isn't worth the time, Especially since you can install Win 7 64bit and its pretty much secure out of the box. It's much harder to root due to

      • by yuhong ( 1378501 )

        Yep, I think it is well known now that installing XP RTM and connecting it directly to the Internet without patching is not safe.

    • Re: (Score:3, Interesting)

      In that time Windows 7 and Vista have been released - both with far better security models out of the box. Even Windows XP saw a reasonable update with SP3.

      With great new code-bases comes great vulnerability.

      I just "removed" (and by remove I mean re-format re-flash BIOS and reinstall Windows) a bit of malware (Banker Rootkit Variant) that exploits a Java vulnerability via applet (JRE was up to date, but the old exploitable versions are still there, and can be targeted -- remove them now), then installs a rootkit via kernel driver -- Somehow miraculously bypassing the fact that drivers must be signed on 64bit MS OSes -- Oh, it's not that special it just disa

    • "as of 2007"? In computer terms, that's several lifetimes.

      Wrong.
      There are plenty of MS Windows XP machines that have not been patched since 2007. Also how many Microsoft based machines have you seen with spreadsheets etc newer than MS Office 2003?

    • by mgblst ( 80109 )

      I count every install of Vista as an infection.

  • While I am glad that the online safety scanner can now clean infections, and will probably consider it in the future, it isn't a very widely used tool because of the windows live branding, rather than as a Microsoft product. Trend Micro Housecall has been around for longer. I wish more antivirus's would scan for lack of service packs or security vulnerabilities.
  • by belmolis ( 702863 ) <billposer@@@alum...mit...edu> on Saturday May 28, 2011 @10:30PM (#36277492) Homepage
    We don't have enough information to estimate the infection rate. For one thing, we don't know how good the scanner is. If it misses a lot malware, the infection rate may be much higher. We also don't know what kind of sample the downloads comprise. If only people who think they have an infection are downloading it, then the sample is biased high and the real infection rate may be much lower. Since it only detected infections in 5% of cases, either the scanner is very bad or people are downloading it as a precaution, not once they think they have an infection. If they're downloading it as a precaution, that probably means they are particularly security conscious, in which case the sample is probably biased toward a low infection rate. Overall, it looks like without more information the percentage of machines found to be infected by this scanner tells us very little.
    • Well said! I was about to make similar comments, but I see that you already did so, and far better than I would have. My first thought was that this was an indication that people who are security conscious still have an infection rate of 5%, but it could easily go other ways, depending on the biases, such as the ones you mentioned.

  • NAT to the rescue! (Score:5, Insightful)

    by ka9dgx ( 72702 ) on Saturday May 28, 2011 @10:37PM (#36277508) Homepage Journal

    The IP6 folks hate NAT, but it's the only thing that's saving personal computing at the moment. Because random inbound connections don't has through NAT devices, any home PC behind one is MUCH safer than one directly on the internet. It sucks in terms of the end to end utility of the internet, but it's the tradeoff most users are willing to make for reasonable safety.

    • by WuphonsReach ( 684551 ) on Saturday May 28, 2011 @10:58PM (#36277582)
      Outbound-only IP6 firewalls will offer the same level of security as NAT. With a few other advantages as well.

      What will remain to be seen is whether the firewall devices can be:

      - Properly configured or come with sane defaults.
      - Fail in a safe manner rather then suddenly just allowing every connection through.
      - Can't be switched to completely transparent by attack software.

      It will be interesting in a few years as IPv6 finally takes off. I think the 3rd option is going to be the interesting one. In a IPv4 NAT'd network, the attacker has to (a) know the internal IPs and (b) add an inbound port forward to the NAT device. In the IPv6 firewall scenario, because the devices inside the network already have routeable addresses, if they can open up the firewall then they win.

      The saving grace will probably be the sheer size of the address pool in a local network. Unless you sniff the traffic (or look at DNS or ARP), knowledge of active IP addresses is hard to come by via scanning. Scanning a 2^64 range for active hosts will take a few years, which will slow down any worms that attempt to spread in that manner.

      A few years, as in enumerating 2^64 addresses and processing 1 million per second means you need about 585,000 years. There are ways to fine that down such as only searching the list of valid MAC addresses, which cuts the size down to 2^40 to 2^48. And you could fine that down even more by only looking for popular MAC addresses, which would probably make it 2^36 to 2^40 roughly. Scanning 2^32 @ 1 million / second takes about 80 minutes, 2^36 is 19 hours, 2^40 is 305 hours. Of course, attempting to scan 1 million hosts per second would bury most boxes and would probably require 10Gbps to pull off.

      Compare that to today's networks where the local network segment usually only has 256 to 4096 possible addresses. Multiple orders of magnitude easier to scan.
    • Re: (Score:2, Informative)

      by Anonymous Coward

      NAT is NOT security. If you want security, the most basic setup is called a stateful firewall. You may want to read about it.

      http://en.wikipedia.org/wiki/Stateful_firewall [wikipedia.org]

      Even better, close down all services that you do not need listening. Application level firewall is another good idea.

      If your security is NAT alone, then it's a sad state of affairs. NAT masks security, nothing more..

      PS. For the all NAT-lovers, there exists an IPv6-NAT too. So saying that IPv6 == cannot have NAT is wrong. On Linux, steteful

      • by ka9dgx ( 72702 )

        I know that NAT doesn't help security against an advanced persistent threat, but it does scrape off the top 99% of all attacks, which is a big plus.

        A stateful firewall can scape off another 99%

        Locking down each service with AppArmor can scrape off another 99%

        Which means you'll still have no effective security against an advanced persistent threat... you'll only be stopping 99.9999%, not all of it.

        Capability based security might give you another 99%, which is good, but not enough.

      • NAT is not security, but it's as close to security as many people will get.

        Sure, there are FAR superior ways. But let's aim low, because that's what malware writers do, too. And as long as enough people can be infected even though NAT would kill the attack vector, NAT is a security feature. This will change when too many people use it and the attack vector ceases to work, but 'til then, it's a simple way for people to gain at least a bit of security.

    • I wonder if all these dropped unsolicited packets I'm seeing bounce off my firewall/NAT are what's causing my bandwidth usage measurements to be so much less than my ISPs capped bandwidth meter is showing... As for "end to end" blockages -- If you don't know how to port-forward, enable UPnP -- everything supports it these days, even ports of old games like Doom. However, being behind an ISPs NAT is unbearable -- that's why ip6 is needed, so that we don't end up behind an un-configurable ISP NAT router.

      • by 0123456 ( 636235 )

        As for "end to end" blockages -- If you don't know how to port-forward, enable UPnP -- everything supports it these days, even ports of old games like Doom.

        Never, ever, ever enable UPnP if you care about security. Allowing random applications to open up random ports is just asking to be pwned.

        • Explain this to me; why is UPnP so insecure? UPnP can only be switched on by a random application if that application has access to the LAN. That application is then _already_ running locally on one of the machines on the network. It can _already_ connect to random machines/ports. If that application now wants to exploit a vulnerability on one of the machines connected to the LAN, it can do it directly, no need to configure any port forwarding to let yet something else in.

          I haven't yet read any realistic ar

      • Besides, It's a part of the atmosphere... flayed and mounted on Lexan hanging from my wall (with lots of carefully routed wires and a few pretty lights that blink intermittently) -- I find wallputers more interesting/functional at than most paintings, plus it's easier to clean, takes up less space and promotes a cozy cyber-punk feel.

        Your ideas are intriguing to me and I wish to subscribe to your newsletter.

    • but it's the tradeoff most users are willing to make for reasonable safety.

      I'd bet almost nobody consciously chooses NAT for security. They choose it because the numbers are running out, pure and simple.

  • by lucm ( 889690 ) on Saturday May 28, 2011 @10:50PM (#36277558)

    > though it's a few years old, here's a report that suggests (as of 2007, at least) a grace period of less than 10 seconds.

    These numbers mean nothing. Just like statistics about domestic abuse ("1 women in 3 is victim of abuse"), that kind of thing cannot be measured so someone comes up with a pseudo-scientific number and everybody keeps repeating this stuff ad nauseam like Rush Limbaugh on election week.

    Individual malware is having way too much exposure in the media for its actual damage. In an era where legitimate companies such as Facebook or Google are cornering the market on privacy violation and shameless data-mining, nobody gives a sh*t about Uncle Joe's private information. Credit card numbers are traded by the thousands and it is not cost-effective to try to harvest valuable information from individual PC - financial institutions and service providers (PSN!) are a much better target.

    The name of the game is now large-scale deployment and a botnet that does not protect its nodes does not live long enough to justify an article on Wikipedia. Actually for home users I would even argue that being part of a botnet can be a good thing - the operators know what malware is serious and they have a financial stake in maintaining a healthy network of zombies; they will keep the basement wannabes away. On a global scale they are the one with the best interest for home PC security - much more than most PC owner themselves. It's like joining a gang when you go to jail for a long time - be part of the swarm and the odds that you end up becoming a silent farter are much lower.

    • Actually for home users I would even argue that being part of a botnet can be a good thing - the operators know what malware is serious and they have a financial stake in maintaining a healthy network of zombies

      My title says it all.

  • by Salvo ( 8037 ) on Saturday May 28, 2011 @10:58PM (#36277576)

    Even if it isn't actually MalWare, the name "Safety Scanner" is as suspect as "Windows Recovery" or "MAC Defender".
    I would have thought Microsoft's marketing department (arguably one of the greatest marketing departments in Info Tech), could have come up with something less dodgy than "Safety Scanner".

    Maybe the people who were inclined to download and install "Safety Scanner" are the same people who are inclined to download and install "Windows Recovery". Making the estimate of 5% high.

    Conversely, maybe the people using "Safety Scanner" were more conscientious about Computer Security and were seeking out extra protection. Making the estimate of 5% low.

  • by sillivalley ( 411349 ) <sillivalley@nospaM.comcast.net> on Saturday May 28, 2011 @11:40PM (#36277710)
    Ran this thing on a server that lives in the closet. It complained that my custom hosts file was very suspicious. It also didn't like the VNC client.

    So this machine was infested with malware? I don't think so!

    Yet another scareware scanner!
    • It complained that my custom hosts file was very suspicious.

      And it is. I mean, don't you think that the line
      65.55.175.254 www.google.com
      is suspicious?

      It also didn't like the VNC client.

      As well it shouldn't. Do you recall installing a VNC client? I don't recall you installing a VNC client. So why is there a VNC client on your system?

      So this machine was infested with malware? I don't think so!

      Yet another scareware scanner!

      No, just a scanner that does what it's supposed to.. report irregularities.

      Just becau

    • by Blakey Rat ( 99501 ) on Sunday May 29, 2011 @10:42AM (#36279590)

      VNC can legitimately be used as spyware in the classic sense. When someone remotely logs in, the local computer shows no indication that activity is being observed by someone else. (Contrast with Microsoft's Remote Desktop, where logging in remotely kicks the local user off and locks their screen.)

      It's exactly the kind of thing this tool is supposed to be scanning for. What makes you think it's a false report? The scanner has no way of knowing whether you installed it, or someone else did behind your back.

  • by Shoten ( 260439 ) on Sunday May 29, 2011 @12:02AM (#36277810)

    One big thing has happened since 2007: Windows has started shipping with the Windows Firewall turned on by default and blocking inbound requests. Since network-spreading worms were the primary contagion factor back in 2007, this made a huge impact all by itself. Also, the growing prevalence of dynamic NAT in households (usually from the wireless routers that everyone has these days) also contributes to this.

  • Those "Windows machines get attacked in 10 seconds" type things are utter rubbish. It was quoted at a recent security conference I went to and I interrupted the speaker about it as it's a blatantly false claim.

    I have an unpatched Windows 2000 machine behind a cheap Netgear router. It's never once been attacked and it sits on the Internet 24/7 sending weather data to an FTP site. It doesn't get used for anything else and it's been up for four years now. The hard drive is too small to install the service p
    • by yuhong ( 1378501 )

      I have an unpatched Windows 2000 machine behind a cheap Netgear router.

      That is because it is behind a router that is an NAT, blocking the attack.

    • 10-20 seconds was a pretty accurate infection frame for an unpatched Windows XP-SP1 machine directly connected to the internet in 2007. I've tried it myself. And considering how frequently people update their machines, I'm still convinced hooking a WinXP-SP1 machine to the net unfiltered will result in an infection within seconds.

      It is NOT true for newer OSs or XP with SP2 or higher. So technically, what he got wrong was the time. A windows machine got infected in 10 seconds. It's not true anymore (for more

  • by Khyber ( 864651 ) <techkitsune@gmail.com> on Sunday May 29, 2011 @12:56AM (#36277980) Homepage Journal

    These are likely not so bad without exposure to Adobe and Java.

    Let us be honest for once.

    • These are likely not so bad without exposure to Adobe and Java.

      Let us be honest for once.


      And Flash and Javascript.

      (And the biggest issue with PDF, Flash and Java plugins are that they use a non-standard update mechanism instead of being built into Windows Updates. And both Oracle and Adobe are horrid about trying to install add-ons like browser toolbars, or constantly changing their update methods. Which leads to users never updating these key pieces of software, thus getting pwn'd a few years down
      • (Flash is Adobe.)

        The biggest issue with Flash's updater is that it doesn't even attempt to check for an update until the computer is rebooted. I'm sure this works for a lot of people, but I basically never reboot my computers-- god knows how many unpatched Flash vulnerabilities I have! Hell, it may be zero. I won't know until I reboot.

        It's actually safer to run Chrome, which has its own internal copy of Flash and an updater that... actually works correctly. Of course, then even the problem is you still need

  • I think lack of information can make a biased output about infection rate. So infected rate that is proved by this scanner gives us a little part of whole scenario. http://www.pranon.com/ [pranon.com]
  • by G3ckoG33k ( 647276 ) on Sunday May 29, 2011 @02:23AM (#36278198)

    Wonder how many wine (www.winehq.org) users are infected, as users.

    http://wiki.winehq.org/FAQ#head-3cb8f054b33a63be30f98a1b6225d74e305a0459 [winehq.org]

    http://www.google.com/search?q=wine+virus [google.com]

    • Funny enough, quite a bit of malware does actually run on Wine. Tells you something about its compatibility. ;)

  • 100%! (Score:2, Troll)

    by purpledinoz ( 573045 )
    I would argue that 100% of Windows machines are loaded with malware, called Windows.
    • Windows is no malware.

      Malware usually gets updated near instantly the moment its maker encounters a problem with it.

  • And only valid for 10 days. No updates, have to re-download the whole thing to have the new definitions. It's *bigger* than most AV software...

    What the heck MS ????

    • And only valid for 10 days. No updates, have to re-download the whole thing to have the new definitions. It's *bigger* than most AV software...

      What the heck MS ????

      Maybe it was not intended to be "AV software"? From the front page of Microsoft Safety Scanner (emphasis mine):

      The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software.

      ...

      The Microsoft Safety Scanner is not a replacement for using an antivirus software program that provides ongoing protection.

      For real-time protection that helps to guard your home or small business PCs against viruses, spyware, and other malicious software, download Microsoft Security Essentials.

      • Maybe it was not intended to be "AV software"? From the front page of Microsoft Safety Scanner (emphasis mine):

        Equivalent tools from other sources do the job in about 1/8th the size.

        (MBAM clocks in at around a 7.5MB download, and the database updates are only a few megabytes.)
  • 5% of windows machines are NOT infected with something.

  • The sample is of necessity limited to users who knew about this tool and downloaded it. I suspect that group to be more security aware than most, and more likely to have a clean system to start with.
  • Almost a decade ago I watched as a blaster variant compromised a XP machine BEFORE THE INSTALL HAD COMPLETED. Microsoft in their infinite wisdom thought it would be cool to enable remote procedure call before you even get a desktop up. (I guess unattended setup scripts weren't enough?) Had to re-install disconnected, patch it, then setup networking. I had no machine at the time to make a patched install disc. None of that would have been a problem if I could have installed my firewall software before window
  • by ZipK ( 1051658 ) on Sunday May 29, 2011 @02:00PM (#36280922)
    If the grace period from going on line to infection is only 10 seconds, how does one build a Windows machine that is secured with the latest patches - given that you need to be on line to get the patches from Microsoft?

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...