Malware Infects PCs Even Before They Reach Retail Shops, Says Microsoft Study (VIDEO)
By Valli Meenakshi Ramanathan | September 16, 2012 8:22 PM EST
A new study conducted by Microsoft dubbed Operation b70, from August 2011, shows that several computers carry counterfeit software embedded with malware, BBC News reported. Apparently, the malware is introduced after the computer is shipped by the manufacturers either by transporters, distributors, or resellers even before they go up for sale in retail shops.
As part of efforts to determine security in its supply chain, the company undertook a study, when its employees brought 10 laptops and 10 desktops from stores located at various cities in China. The new laptops and desktops were found to contain malware and specifically a botnet by name Nitol that resulted in a court order giving the company permission to adopt technical measures to disrupt the botnet.
"We went into what they call PC malls," Richard Boscovich, assistant general counsel for Microsoft Digital Crimes Unit, told CNET in an interview: "We wanted to get a sampling of what an average consumer in China would get. We were surprised how quickly we were able to find something to back up the suspicion."
Apparently, Nitol steals personal details to help criminals break into online bank accounts.
A blog post by the company noted how it disrupted over 500 different strains of malware that held potential for attacking millions of PC users. This is the second successful botnet disruption the company has undertaken in the last six months that has significantly limited the spread of Nitol botnet.
"What's especially disturbing is that the counterfeit software embedded with malware could have entered the chain at any point as a computer travels among companies that transport and resell the computer," the company added in its blog post.
Also, investigations revealed that the botnet behind Nitol originated from a Web domain that was involved in cybercrime since 2008. Further, the domain hosted 70,000 separate sub-domains used by 500 separate strains of malware to fool victims or steal data.
"We found malware capable of remotely turning on an infected computer's microphone and video camera, potentially giving a cybercriminal eyes and ears into a victim's home or business," the blog post pointed out.
Reportedly, a U.S. court granted permission to Microsoft Sept.10, to seize control of the Web domain, 3322.org, which it identifies as involved in Nitol infections. This enables separation of legitimate data and blocking stolen traffic by viruses.
Peng Yong, the Chinese owner of the 3322.org domain, told the Associated Press that he knew nothing about Microsoft's legal action and assured that his company engaged in a "zero tolerance" attitude toward illegal activity on the domain.
"Our policy unequivocally opposes the use of any of our domain names for malicious purposes," Peng told the AP.
"We currently have 2.85 million domain names and cannot exclude that individual users might be using domain names for malicious purposes," he added.
To contact the editor, e-mail:
Most Popular Slideshows
Join the Conversation
- Chilling: New ISIS Video Addresses Australia; Aussie Teen Delivers Message
- The Pirate Bay Blockade: Cost Of Blocking Websites Like TPB Is Ridiculously High
- Xiaomi Mi4 And MiPad Prices Likely Slashed, Thanks To Rivals Oppo, OnePlus And Meizu
- Top 4 Free-To-Download Apps for Fuller iPhone 6, 6 Plus Experience
- Battery Saving Android 5.0 Lollipop Feature Extends The Battery Life Of Your Android Device By 90 Minutes And Displays Orange Bar While Power Saving Mode Is On
- Virginia Woman Who Posted Naked Image Of Ex-BF’s New Partner 1st Person Charged Under Revenge Porn Law
- Australia's 'No Way' Anti-Asylum Seeker Poster Sparks Outrage