Microsoft report: Users responsible for half of all infections
Source: Microsoft In its latest security report, Microsoft finds that only 5.6 per cent of all infections with malicious software are the result of security holes. Almost half the time (45 per cent), users infect their computers by launching malicious software themselves.
Infected USB sticks are behind an impressive 26 per cent of all attacks. This vulnerability is made possible by the USB autostart function, which was only included in Windows up to Vista; in February, Microsoft disabled it with an update. Infected network shares are behind 17.2 per cent of all attacks, with contaminants spreading by infecting other files 4.4 per cent of the time.
Brute force attacks on passwords and manipulation of Office macros are relatively negligible in spreading viruses at 1.7 and 0.3 per cent, respectively. It is the first time that Microsoft has analysed how viruses are disseminated in its report. Up to now, a lot of experts had assumed that vulnerabilities play a much greater role in computer infections.
The number of infected computers in the UK dropped though. In the third quarter of 2010, 7.4 in every 1,000 computers investigated in the UK were infected, a figure that dropped to only 5.2 infected computers in the second quarter of this year. The UK performs reasonably well in this respect compared to the global average of 9.8 computers. British computer users mainly fall prey to adware (49.1 per cent). 31.9 per cent came into contact with "miscellaneous trojans", a rise of almost 5 percentage points, and 27.9 per cent came into contact with "potentially unwanted software".
Fake anti-virus software leads the trojans in the top ten: the sixth place is taken Win32/FakeRean, with Alureon coming in tenth place; in Germany, Alureon is the only trojan in the top ten. While it was still there in the second half of 2010, ZeuS has now disappeared from the top ten altogether, as has Conficker.
The data analysed was collected in 100 countries from more than 600 million systems on which Microsoft's Malicious Software Removal Tool is used. Microsoft offers instructions that IT experts can download to help identify and remove malicious software on their systems.