TECH ED - Malware's commercialisation drives security
- 15 June, 2006 08:41
As long as there's money to be made, computer security will be an issue, panelists at the Microsoft TechEd 2006 conference said Tuesday.
They said security remains a problem because of commercial incentives to build malicious software, but progress is being made and the fight will continue.
"The biggest trend I think we hear talked about is the move toward kind of commercial malicious software," such as spyware and software to harvest passwords, said Adam Overton, a group manager on the Microsoft Antimalware Team. The chance for monetary gain means there will be a lot more of this software, he said.
Other panelists agreed. "There's a growing trend on getting on a machine and staying [stealth] on the machine," so people cannot detect that the software is there, said Mark Russinovich, chief software architect and co-founder of Winternals Software.
Responding to a question on the perception that malicious software is Microsoft's fault, Matthew Braverman, also a program manager for Microsoft's Antimalware Team, cited social engineering as a cause of attacks. These attacks can enter a system through e-mail, Instant messaging, or peer-to-peer networking. Social engineering, added Russinovich, tries to get people to consent to having malware installed on their machines.
Malware, he said, will be adapted to live in a limited environment, not needing a rootkit, for example.
Despite the dire predictions of security remaining an issue, panelists noted progress and cited solutions. Offline scanning, for example, is an effective tool for a system infected with a rootkit, Braverman said.
Companies, meanwhile, need to enforce restriction policies on software being installed on their computers, Russinovich said. "The trend that I see here in a corporate environment is the only way to really remain safe is to enforce application execution policy across your desktops," said Russinovich. He acknowledged his company offers products for this purpose and that his remarks may be viewed as self-promoting.
Microsoft's Antimalware Team recognizes that given the amount of malware existing, it is not feasible to look into every variant. For example, the company has seen 2,000 variants of the Win32/Rbot per month, Braverman said. But Microsoft is working on signatures to combat Rbots.
Fighting malicious software is a battle that can be won, said Christopher Budd, a Microsoft security program manager. Braverman added that progress is being made but more needs to be done. The company is seeing an average decrease of malware variants that it knows about, he said. Tools available are having an impact, he said.
Malware authors, meanwhile, are being forced into a smaller box, Russinovich said. "Before, they could write whatever kind of crap and it would detect people's machines," Russinovich said. "Now, that's becoming much more difficult."
The panel session at TechEd occurred on the same day Microsoft released its largest collection of security patches in a year.