Microsoft: Software More Secure, but Malware Is Growing Threat

The number of software vulnerabilities in the first half of 2008 dropped 4 percent compared with the previous six months and a respectable 19 percent from the first half of 2007.

The number of software vulnerabilities reported in the first half of this year continued a year-old downward trend, dropping 4 percent compared with the previous six months and a respectable 19 percent from the first half of 2007, according a report released today by Microsoft Corp.

But this is not time to relax your guard. The amount of malicious code and other unwanted software being removed from computers jumped a whopping 43 percent in the first half of the year compared with the previous six months.

Part of that jump is attributed to the wider use of clean-up software that produced the data, said Microsoft principal engineer Jimmy Kuo. But when normalized for distribution the figures still show a 23 percent increase in unwelcome code, he said. The prevalence of Trojan downloaders and droppers, which have been the dominant type of malicious code encountered for the last year, is evidence of a continuing trend toward use of botnets for organized crime, he said.

The report is the fifth biannual Microsoft Security Intelligence Report and covers the period from January though June of this year. It contains data on the complete spectrum of vulnerabilities, exploits and threats, not just Microsoft software.

"There were no real surprises in the report," Kuo said. "We were gratified to see continued downward trends. For the most part, everything went for the better," although the jump in malicious and unwanted code was an exception.

There also was a jump in the percentage of vulnerabilities rated as severe during the period covered as compared to the preceding six months, but the 13 percent figure still was lower than in the first half of 2007. Of more concern to Kuo was the increase in the number of vulnerabilities requiring a low level of complexity to exploit. But hackers seem to be unable to reliably exploit even simple vulnerabilities. According to the report, only slightly more than 10 percent of the simple vulnerabilities had publicly available exploit code that would consistently work. "The rest were either unreliable or ineffective," it said.

Figures show a continued trend of attacks moving away from operating systems and to applications. More than 90 percent of vulnerabilities disclosed from January through June were for applications.

Microsoft is claiming improvements in the security of its latest operating system, Windows Vista. The report says that 42 percent of all browser-based attacks on machines running Windows XP targeted vulnerabilities in Microsoft products. On Vista machines, only 6 percent of attacks targeted Microsoft vulnerabilities.

Kuo said the trend holds true for all service pack versions of both operating systems and that the 64-bit version of Vista had fewer Microsoft vulnerability attacks than the 32-bit version.

"This demonstrates how the latest Microsoft products and technologies appear to be at less risk from publicly available exploit code than earlier products," the company said in a statement. Kuo attributed the improvements to Microsoft's use of a secure development lifecycle process.

An interesting finding in the report is the unique threat profile for different countries. In the United States, Trojan downloaders such as Win32/Zlob account are by far the largest single category of threat. In Brazil, it is password stealers such as Win32Bancos that dominate with a 60 percent market share. China is dominated by adware, Italy by unwanted peer-to-peer software, Korea by viruses and Spain by worms.

The distinct profiles reflect the characteristics that hackers and criminals are targeting in each country, Kuo said. Brazil has the highest per-capita level of online banking, so phishing and password stealing is big there. Korea is one of the most highly connected countries, so viruses spread more easily in that environment.

The report recommends some common-sense steps for defending yourself online:

  • Check for and apply software updates on an ongoing basis, including updates provided for third-party applications.
  • Enable a firewall.
  • Install and maintain up-to-date anti-virus and anti-spyware programs.
  • Uninstall software you don't actively use. Malicious code can exploit vulnerabilities in software whether you use it or not.
  • Avoid browsing to sites that you do not trust.
  • To avoid attacks that rely on administrative user rights, enable User Account Control in Vista, or log in with a user account that does not have administrative user rights.
  • Read e-mail messages in plain text format to help protect yourself from the HTML e-mail attack vector.

About the Author

William Jackson is the senior writer for Government Computer News (


  • Microsoft Ending Azure Container Service Support in 2020

    Microsoft gave notice earlier this month that it will be ending its Azure Container Service on Jan. 31, 2020.

  • Microsoft Releases Surface Diagnostic Toolkit for Business

    Microsoft released a new tool, Surface Diagnostic Toolkit for Business, earlier this month, providing a means for IT pros to find and troubleshoot problems on Microsoft Surface devices.

  • How To Enable Guest Access for Office 365

    While it's possible to give outside users access to certain content in your organization's Office 365 environment, the process of setting them up requires a few extra steps.

  • Microsoft Now Supports OpenSSH in Windows Server 2019

    Microsoft announced on Tuesday that the OpenSSH solution used for remote management is now a supported "Features on Demand" addition in both Windows 10 version 1809 and Windows Server 2019.

comments powered by Disqus
Most   Popular

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.