Compromised Windows PCs bought in China pose risk to U.S.

Counterfeit versions of Windows running on Chinese PCs do more than take money from Microsoft's pocket, they also pose a security threat to U.S. companies and consumers, experts say.

Microsoft has launched an anti-piracy campaign highlighting the risk posed by Windows knockoffs to discourage potential Chinese buyers. After purchasing 169 PCs with bogus copies of Windows, Microsoft found that more than 90 percent contained malware, such as keyloggers and spyware, or deliberate security vulnerabilities.

Statistically, Microsoft's sample doesn't provide enough information to draw a conclusion on the percentage of such compromised PC in China. However, there's little doubt on the economic damage caused by counterfeit software. The Business Software Alliance pegs the value of the illegal software market at $9 billion in China versus $2.7 billion for the legal market.Ã'Â

Beyond the financial impact on Microsoft, PCs compromised through bogus copies of Windows oftentimes end up as zombies within botnets used to spread spam and malware outside of China, including the U.S., experts say.

"Compromised PCs running unpatched versions of pirated copies of commercial operating systems are routinely used in DDoS [distributed denial of service] and other botnet abuses," said Neal Quinn, chief operating officer of Prolexic. "It happens in many countries, not just China."

[In depth: The botnet hunters]

Chinese cybercriminals would unlikely build domestic botnets, because of the performance problems that would arise from the Chinese government filtering all Internet traffic coming in and going out.

"One defensive advantage we have here is the Great Firewall," said Andy Ellis, chief security officer for Akamai.

However, compromised systems exported to other countries, such as Thailand, South Korea, Malaysia and Vietnam, would make good botnet candidates, said Dan Olds, an analyst for Gabriel Consulting Group.

In September, Microsoft took down a major botnet that used malware distributed through counterfeit Windows in PCs built in China and sold in stores in and outside the country. The Nitol botnet spread malware that included keyloggers, rootkits and Trojans. The Nitol malware also was found in the latest PCs bought by Microsoft.

The threat also goes beyond Windows. It is not unusual for crooks in China to sell counterfeit Office with Windows as a package, adding another layer of malware or intentional vulnerabilities.

PC sellers often take the illegal software, because the deal offered by criminals is too good to pass up. Rather than buy a legitimate copy of Microsoft software, they often get the bogus version for free and are sometimes even paid to carry it. "The choice gets pretty obvious," Olds said.

Where compromised systems resides mean little to people running botnets, since the malware within the PCs can be controlled through a server in any location, said Mary Landesman, a senior security researcher at Cisco. Spreading a botnet across multiple countries makes it more difficult for law enforcement to take the network down.

"There's no benefit to an attacker to have all of the machines [in one country]," Landesman said. "In fact, it's to their detriment to have all of the machines located in the same physical locale."

Read more about application security in CSOonline's Application Security section.

Tags: applications, Access control and authentication, botnet, software, counterfeit, data protection, business software alliance, Microsoft Windows, BSA, Data Protection | Application Security, security, Microsoft

Storing in the cloud securely: 30 services compared

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Web Aplication Security

Safeguard your websites against cyber attacks and data loss.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.