Microsoft admits millions of computers could be infected with malware before they're even out of the box
Hackers have uploaded viruses which can help them steal people's personal data on to millions of PCs and laptops before they are even taken out of the box, Microsoft has admitted.
The company said it found malware which allows would-be criminals to remotely switch on and control cameras and microphones, among other devices, on machines which were still factory sealed. The software is loaded with counterfeit copies of Microsoft Windows, the company said.
“Cybercriminals have made it clear that anyone with a computer could become an unwitting mule for malware,” wrote Microsoft's assistant general counsel for its Digital Crimes Unit, Richard Domingues Boscovich.
On the company's blog, he added: “Malware allows criminals to steal a person's personal information to access and abuse their online services, including e-mail, social networking accounts and online bank accounts. Examples of this abuse include malware sending fake e-mails and social media posts to a victim's family, friends and co-workers to scam them out of money, sell them dangerous counterfeit drugs, and infect their computers with malware.”
Boscovich said the counterfeit software could enter the supply chain “at any point” because a machine normally passes through the stock rooms of numerous companies between the Microsoft factory and the consumer's living room. Any of these could potentially - unwittingly or otherwise - load counterfeited software on to the computer.
He added: “So how can someone know if they're buying from an unsecure supply chain? One sign is a deal that appears too good to be true. However, sometimes people just can't tell, making the exploitation of a broken supply chain an especially dangerous vehicle for infecting people with malware.”
The company launched a two-pronged attack on the developing Nitol botnet - a method of controlling many computers using only one. Microsoft's plan of legal action and technical disruption, codenamed “Operation b70”, found that “20 per cent of the PCs researchers bought from an unsecure supply chain were infected with malware”.
Boscovich wrote: “Our research into Nitol uncovered that the botnet was being hosted on a domain linked to malicious activity since 2008. This study also revealed that in addition to hosting b70, 3322.org contained a staggering 500 different strains of malware hosted on more than 70,000 sub-domains.
“We found malware capable of remotely turning on an infected computer's microphone and video camera, potentially giving a cybercriminal eyes and ears into a victim's home or business. Additionally, we found malware that records a person's every key stroke, allowing cybercriminals to steal a victim's personal information.
“The Nitol botnet malware itself carries out distributed denial of service (DDoS) attacks that are able to cripple large networks by overloading them with Internet traffic, and creates hidden access points on the victim's computer to allow even more malware - or anything else for that matter - to be loaded on to an infected computer.”
In the post, he also wrote that the malware was capable of transmitting to other computers via USB flash drives, meaning it would spread fast through a family or work place. Microsoft has now been given permission by a US court to shut down the domain behind the scheme.
According to PC Advisor, Boscovich revealed that Microsoft bought computers from “PC malls” in various Chinese cities, all of which had counterfeit copies of Windows XP or Windows 7 installed. Of the twenty purchased, three had inactive malware and one had live malware, called “Nitol.A,” that awoke when the computer connected to the Internet.
The problem is not thought to affect Western physical supply chains but the malware could be transmitted if users download infected software.
Life & Style blogs
Who is Teresa Fidalgo? Debunking the fake ghost story that's got Instagram spooked
Geeks who rocked the world: Documentary looks back at origins of the computer-games industry
Ukip's official health spokesperson: 'Honestly, I have no experience in health whatsoever'
Deliberately urinating before sex can increase risk of urinary tract infections
Doctors to trial 29-point checklist for elderly patients facing 'unavoidable' death
British Muslim leaders outraged after Eric Pickles says followers of Islam should 'prove their identity'
UK terror fears: My jihadist son returned from Syria mentally scarred – now he is being ignored
Nigel Farage: NHS might have to be replaced by private health insurance
Billy Crystal: 'Stop shoving gay sex scenes in my face'
French court convicts three over homophobic tweets, in case hailed as a 'significant victory' by LGBT rights campaigners
'We would evict Queen from Buckingham Palace and allocate her council house,' say Greens
- 1 The truth about 'girl things': Three cheers for Heather Watson's honesty
- 2 Man who held up 'hire me' sign at Waterloo station returns a year later with 'I'm hiring' sign
- 4 Tennis fan suing Australian Open organisers for 'failing to shade spectators' during Murray match
- 5 Syrian refugee child beaten by Istanbul Burger King manager for eating customer’s leftover food
iJobs Gadgets & Tech
£25000 - £30000 per annum: Ashdown Group: Junior Test Analyst/Systems Administ...
£40000 - £65000 per annum: Recruitment Genius: A Global Real Estate Software P...
Negotiable: Recruitment Genius: This is an exciting opportunity for a talented...
£17000 - £26000 per annum: Recruitment Genius: Due to continuing growth, recru...