+Frank B. Subscriber² Posted July 29, 2011 Subscriber² Share Posted July 29, 2011 Windows XP PCs breed rootkit infections Three-fourths of all rootkits on decade-old OS, says antivirus firm Machines running the decade-old Windows XP make up a huge reservoir of infected PCs that can spread malware to other systems, a Czech antivirus company said today. Windows XP computers are infected with rootkits out of proportion to the operating system's market share, according to data released Thursday by Avast Software, which surveyed more than 600,000 Windows PCs. While XP now accounts for about 58% of all Windows systems in use, 74% of the rootkit infections found by Avast were on XP machines. XP's share of the infection pie was much larger than Windows 7's, which accounted for only 12% of the malware-plagued machines -- even though the 2009 OS now powers 31% of all Windows PCs. Rootkits have become an important part of the most sophisticated malware packages, particularly botnets, because they mask the infection from the user, the operating system and most security software. By installing a rootkit, the hacker insures the compromise goes undetected as long as possible, and that the PC remains available to the botnet's controller for nefarious chores, such as sending spam or spreading malware to other machines. Avast attributed the infection disparity between XP and Windows 7 to a pair of factors: The widespread use of pirated copies of the former and the latter's better security. "According to our stats, as many as a third of XP users are running SP2 [service Pack 2] or earlier," said Ondrej Vlcek, the chief technology officer of AVAST, in an interview Thursday. "Millions of people are out of support and their machines are unpatched." Vlcek assumed that many of the people running XP SP2, which Microsoft stopped supporting with security patches a year ago, have declined to update to the still-supported SP3 because they are running counterfeits. Although Microsoft serves everyone, even pirates, its monthly security patches and service packs, most security experts believe that users of illegal copies are very hesitant to upgrade or even patch for fear that they'll trigger the black screen and anti-piracy nag notices that Microsoft slaps on screens when it deems a PC is running a counterfeit copy of Windows. Vlcek urged users running legal copies to upgrade to XP SP3. "Moving to SP3 is the most basic thing that should be done," he said. Also in play, said Vlcek, is Windows 7's stronger security, especially the 64-bit version. "The 64-bit version [of Windows 7] has some technologies that really make it much more difficult for rootkits to infect the computer," said Vlcek, calling out that version's kernel driver-signing feature as key to keeping rootkits off machines. But that hasn't completely protected Windows 7 64-bit, as Vlcek acknowledged. "The surprising part to me was that I thought the Windows 7 [number] would be even smaller," Vlcek said. Rootkits able to infect 64-bit copies of Windows 7 remain relatively rare, but they're certainly not unknown: The first popped up in August 2010, and a massive botnet some have called "practically indestructible" last month used a variant of the same malware to install a 64-bit rootkit on Windows 7. That malware, which goes by a number of names -- Alureon, TDL, Tidserv and most recently, TDL-4 -- is especially devious, as it installs the rootkit into the Master Boot Record (MBR). The MBR is the first sector -- sector 0 -- of the hard drive, where code is stored to bootstrap the operating system after the computer's BIOS does its start-up checks. By subverting the MBR, the rootkit is even tougher to detect, since it's already in place by the time the OS and security software are loaded into memory. Avast found that rootkits which infected the MBR were responsible for 62% all rootkit infections. Users who suspect that their PC is infected with an MBR-based rootkit can scrub their machine with one of several free rootkit detectors, including Avast's "aswMBR" and Sophos' "Anti-Rootkit." Source: Computerworld Link to comment Share on other sites More sharing options...
Ci7 Posted July 29, 2011 Share Posted July 29, 2011 /pwned Link to comment Share on other sites More sharing options...
MS Bob 11 Posted July 31, 2011 Share Posted July 31, 2011 /pwned only if running as admin. Just run it as limited user and use the built-in RunAs or SuRun (http://www.wilderssecurity.com/showthread.php?t=196737) if you use app that require admin privileges. There's ASLR (http://wehntrust.codeplex.com/) for XP too. Link to comment Share on other sites More sharing options...
Wolfbane Posted July 31, 2011 Share Posted July 31, 2011 The fact that Windows 7 has a 12% share of the infections shows that MS still has a way to go with idiot-proofing their OS. I guess one of the problems with security software is that the more often it notifies the user about something, the less likely the user is to read it (and the more likely they are to just click "Yes"). Link to comment Share on other sites More sharing options...
+Warwagon MVC Posted July 31, 2011 MVC Share Posted July 31, 2011 The fact that Windows 7 has a 12% share of the infections shows that MS still has a way to go with idiot-proofing their OS. I guess one of the problems with security software is that the more often it notifies the user about something, the less likely the user is to read it (and the more likely they are to just click "Yes"). The issue is everyone has java and nobody updates it. Link to comment Share on other sites More sharing options...
HawkMan Posted July 31, 2011 Share Posted July 31, 2011 since when did XP have a 58% market share. http://en.wikipedia.org/wiki/OS_market_share Even the artifically high values of "Net Market Share" only lists it as 51, while the more realistic median value is 37. Heck even the second highest value after the artificial NMS numbers is 42.1%. so assumign the rootkit share numbers are more correct than the OS market share numbers they use. the numbers are even more scary for XP. and that would seem more in line with my experiences as well. Link to comment Share on other sites More sharing options...
cybertimber2008 Posted July 31, 2011 Share Posted July 31, 2011 The issue is everyone has java and nobody updates it. Java's updater doesn't make it any easier at times. Link to comment Share on other sites More sharing options...
Xilo Posted July 31, 2011 Share Posted July 31, 2011 The fact that Windows 7 has a 12% share of the infections shows that MS still has a way to go with idiot-proofing their OS. I guess one of the problems with security software is that the more often it notifies the user about something, the less likely the user is to read it (and the more likely they are to just click "Yes"). There's no cure for stupid. Link to comment Share on other sites More sharing options...
Neyht Member Posted July 31, 2011 Member Share Posted July 31, 2011 Java's updater doesn't make it any easier at times. Yeah, does the 64 bit version of java even have a working updater? since when did XP have a 58% market share. The 58% was probably true when the study was conducted and these are the results of that study....or are you really asking when did xp have 58% market share? If that's the case, then probably sometime last year? Link to comment Share on other sites More sharing options...
Hum Posted July 31, 2011 Share Posted July 31, 2011 Odd -- I have never had a rootkit. Sounds like propaganda to sell more Windows 7. Link to comment Share on other sites More sharing options...
HawkMan Posted July 31, 2011 Share Posted July 31, 2011 Odd -- I have never had a rootkit. Sounds like propaganda to sell more Windows 7. The thing about a rootkit is that you don't know you have it. So. how do you know... Link to comment Share on other sites More sharing options...
Prince781 Posted July 31, 2011 Share Posted July 31, 2011 There's no cure for stupid. Win. Link to comment Share on other sites More sharing options...
Hum Posted August 1, 2011 Share Posted August 1, 2011 The thing about a rootkit is that you don't know you have it. So. how do you know... Ah, you run anti-rootkit programs. :rolleyes: Link to comment Share on other sites More sharing options...
+Warwagon MVC Posted August 1, 2011 MVC Share Posted August 1, 2011 Ah, you run anti-rootkit programs. :rolleyes: You meant from outside of windows right? :whistle: Link to comment Share on other sites More sharing options...
HawkMan Posted August 1, 2011 Share Posted August 1, 2011 ^ Ah, you run anti-rootkit programs. :rolleyes: And they don't always detect them. Doesn't change the fact that Vista and 7 protect you against malware and especially rootkits many many many times better than XP. Link to comment Share on other sites More sharing options...
NEVER85 Posted August 1, 2011 Share Posted August 1, 2011 Odd -- I have never had a rootkit. Sounds like propaganda to sell more Windows 7. Yeah god forbid that. I mean, we should ALL stay on a decade-old operating system. :rolleyes: Link to comment Share on other sites More sharing options...
Recommended Posts