However, the rootkits infection rate is on the decline, partly due to updated security applications that add anti-rootkit features.
In the first 6 months of 2006, Microsoft found that more than 43,000 variants of backdoor bots and Trojans are controlling millions of computers hijacked. They form a botnet network that brings convenience to hackers.
Alarm of dangerous bot, Trojan infection rate Picture 1Source: CNN Of the 4 million computers cleaned up by Microsoft's malware removal tool (MSRT), more than half contain at least one backdoor Trojan. Although this rate is quite high, Microsoft still claims to have decreased compared to the second half of 2005 (68%).
Although rootkits cause quite a lot of scandal on the newspaper in late 2005, this is not a big risk for users. "The number of rootkit attacks has dropped by 50%, which is a trend that needs more monitoring ," the report said.
It is no surprise that Microsoft has identified the "chat" technique of hackers as "growing". They used a lot of familiarization, conversation, and guest tips via email and P2P networks for users.
The MSRT was first released in January 2005 and is currently being used in more than 290 million personal computers. During the first half of 2006, this tool has run more than 1.6 billion times.
Some notable conclusions
Backdoor Trojan : The first half of 2006 saw a significant number of new Trojans. Most belong to bot families, such as Win32 / Rbot and Win32 / Sdbot. In the face of growing security, the owners of bot networks are constantly creating and spreading new Trojan variants to maintain their networks and to avoid detection by malware removal tools.
Password stealing and keyboard monitoring software : Second in the most crowded malware list, in terms of number of variations. Although this form of malware exists globally, a large number of them come from Brazil. Several thousand new variants of Win32 / Banker and Win32 / Bancos were discovered here in the first 6 months of 2006. They mainly use Portuguese on their interface and mainly serve to steal information. Bank account.
Download software : The third most malware list. Attackers often use them to copy to the victim the files needed to complete the hack and control the system. In addition, download software also serves to distribute spyware and adware.
Depth : Deep families are common but few. Bulk email worms continue to run globally.