Paul Krill
Editor at Large

Malware’s commercialization driving security challenge

news
Jun 13, 20063 mins

Security remains a problem because of commercial incentives to build malicious software, but progress is being made, panelists say

As long as there’s money to be made, computer security will be an issue, panelists at the Microsoft TechEd 2006 conference said Tuesday.

They said security remains a problem because of commercial incentives to build malicious software, but progress is being made and the fight will continue.

“The biggest trend I think we hear talked about is the move toward kind of commercial malicious software,” such as spyware and software to harvest passwords, said Adam Overton, a group manager on the Microsoft Antimalware Team. The chance for monetary gain means there will be a lot more of this software, he said.

Other panelists agreed. “There’s a growing trend on getting on a machine and staying [stealth] on the machine,” so people cannot detect that the software is there, said Mark Russinovich, chief software architect and co-founder of Winternals Software .

Responding to a question on the perception that malicious software is Microsoft’s fault, Matthew Braverman, also a program manager for Microsoft’s Antimalware Team, cited social engineering as a cause of attacks. These attacks can enter a system through e-mail, Instant messaging, or peer-to-peer networking. Social engineering, added Russinovich, tries to get people to consent to having malware installed on their machines.

Malware, he said, will be adapted to live in a limited environment, not needing a rootkit, for example.

Despite the dire predictions of security remaining an issue, panelists noted progress and cited solutions. Offline scanning, for example, is an effective tool for a system infected with a rootkit, Braverman said.

Companies, meanwhile, need to enforce restriction policies on software being installed on their computers, Russinovich said. “The trend that I see here in a corporate environment is the only way to really remain safe is to enforce application execution policy across your desktops,” said Russinovich. He acknowledged his company offers products for this purpose and that his remarks may be viewed as self-promoting.

Microsoft’s Antimalware Team recognizes that given the amount of malware existing, it is not feasible to look into every variant. For example, the company has seen 2,000 variants of the Win32/Rbot per month, Braverman said. But Microsoft is working on signatures to combat Rbots.

Fighting malicious software is a battle that can be won, said Christopher Budd, a Microsoft security program manager. Braverman added that progress is being made but more needs to be done. The company is seeing an average decrease of malware variants that it knows about, he said. Tools available are having an impact, he said.

Malware authors, meanwhile, are being forced into a smaller box, Russinovich said. “Before, they could write whatever kind of crap and it would detect people’s machines,” Russinovich said. “Now, that’s becoming much more difficult.”

The panel session at TechEd occurred on the same day Microsoft released its largest collection of security patches in a year.

Paul Krill

Paul Krill is editor at large at InfoWorld. Paul has been covering computer technology as a news and feature reporter for more than 35 years, including 30 years at InfoWorld. He has specialized in coverage of software development tools and technologies since the 1990s, and he continues to lead InfoWorld’s news coverage of software development platforms including Java and .NET and programming languages including JavaScript, TypeScript, PHP, Python, Ruby, Rust, and Go. Long trusted as a reporter who prioritizes accuracy, integrity, and the best interests of readers, Paul is sought out by technology companies and industry organizations who want to reach InfoWorld’s audience of software developers and other information technology professionals. Paul has won a “Best Technology News Coverage” award from IDG.

More from this author