Security Blog

The latest news and insights from Google on security and safety on the Internet

Web Server Software and Malware

June 5, 2007
Share on Twitter Share on Facebook
Google

35 comments :

Carlos said...

The study should include the distribution of the 70000 domains in the total number. This would show if the conclusion is fair enough with the web server investigation.
This only true if it follows a normal distribution and a representative subset.

June 5, 2007 at 6:15 PM
Unknown said...

I think the point of patch is totally wrong.

First, by my knowledge, pirated Windows still can get Automatic Update automatically download patch, they just can't go to Windows Update/Microsoft Update/Microsoft Download Center site for manual update. So almost all Windows can get all the required security patch.

Second, I don't think that all malicious is caused by hacking into an unpatched Windows. Maybe the user accidently open an attachment and install some trojans. So the user's computer become a malicious web server through the control of trojan from hacker, not through break into an unpatched security hole. So I think some IIS rate of China and S. Korea is contributed from the many hackers from those country, sending trojan mails with their familiar language to their people. So the count of China and S. Korea just reflect the fact that the hackers from these country is more then other country.

Third, I think that the count is by IP/domain name. I think hackers also host the malicious web server by themself. They get many IPs and domain names to point to a single web server to avoid detection/blocking. So the count of web server cannot see as so much individual web server. Maybe the hackers from China and S. Korea/Russia is familiar with IIS/Apache, so they contribute many many counts by physically single IIS/Apache.

The last, most people who install Apache because he/she want to populate a web site. He/she should open their site often. If there are any problem they will know at first time and try to clear them. But many people who install IIS just because Windows install and enable it by default. (I have forget which Windows version will do that) They never open the site on localhost, they even don't know they have a web site on their computer. So they don't know their IIS is used for distributing malware. The malicious IISs live for a long time, so the statistics show that the rate of malicious IIS is more then the rate of all IIS.

June 6, 2007 at 9:56 PM
IRONICLAW said...

Ermm I'm kinda new to blog but anyway what the heck.. In my own opinion Apache is much safer compared to IIS, and why am i saying so?? Because it's M$ own fault for causing so. M$ detected in IIS 5.0 there's a loophole that allow hacker to exploited it and it provides the technical details to all to view on where and how to actually exploit the loophole (which in my own term is pretty idiotic). And at the same time no patch or solution was provided (ain't that is similar to blowing off your own whistles).. And the solution provided is nothing much just as usual,: Please upgrade to a updated version of M$ products IIS 5.0 to IIS 6.0 (hey!! IIS 6.0 wasn't optimized for WinXP/2000 initially, only Win2003 Servers), WinXP to Vista blablabla (why can't I remain wih my legacy systems which I pretty comfortable with, and where the heck is my patch?? M$, YOU found it then give me the solutions or workaround to the loophole not just telling me Yeap!! OUR product is faulty so live with it; in which I can't, sorry).. That's why Apache is better position, at least if there a loophole detected, though no patch is provided, some tweakers might have some ideas on setting the pace right unlike M$, huh!! 1 billion dollars on research, what a waste.. I started to doubts the IQs of M$ software engineers.. Sigh, geniuses Yeah MY @SS

June 7, 2007 at 1:07 PM
Unknown said...

I too agree some of these malware spreading IIS servers may have been infected via another means (like a trojan) and the malware turned on the IIS service to infect others/do other evils.

It's a lot like spam botnets.

June 8, 2007 at 3:55 AM
Unknown said...

It is worthy to note that the reason for the disparity of IIS in South Korea is likey due to the tiein that S Korea has into Microsoft OPerating Systems. More details here:

http://www.kanai.net/weblog/archive/2007/01/26/00h53m55s#003095

Makes intresting reading. Tied into the fact that S Korea has a large propensity for Bots which is not just due to their runnig MS products but also due to the large amounts of available bandwidth. It would be intresting to know how many of the compromised servers were home based machines or hosted.

June 11, 2007 at 10:35 PM
Offshore Software Development said...

IP and Data Security - Companies considering outsourcing their software development need to know and protect themselves against the risks related to the Intellectual property violations as well as Data Security. In order to mitigate this risk, clients need to check with the vendors on steps that they will take to protect their IP and the sensitive data such as customer information, employee information, financial data and market research data. This should be done during the Vendor Selection process.Clients should ensure that selected vendor has the well documented Information Security Management (ISM) Policy. Vendors need to provide a dedicated project and data server to their clients with audit control access on all the servers. Client should check that the Vendor’s facility is secured with smart card control access and vendor’s development team members have signed the Confidentiality agreements. In addition, the development contract should include clauses for Non-compete, Non-disclosure and non-solicitation.

Software Development Company

September 22, 2007 at 6:26 AM
Offshore Software Development said...
This comment has been removed by the author.
September 22, 2007 at 6:26 AM
Offshore Software Development said...
This comment has been removed by the author.
September 22, 2007 at 6:26 AM
Anonymous said...
This comment has been removed by a blog administrator.
October 11, 2007 at 2:00 AM
krish said...

Given the stats in this article though not a complete survey, but the figures certainly hints to the growing concern i.e the objective of the world wide web is getting contaminated from every parts of the world.

March 3, 2008 at 7:22 AM
root123 said...

Software Development Company The study is a remarkable step in highlighting one of the core issues that the web is facing today

March 13, 2008 at 7:23 AM
John said...

I knew that Apache was leading the way in the web server community but I did not realize the extent to which IIS and other windows web servers were trailing the hosting industry.

March 24, 2008 at 1:12 PM
Unknown said...

For nice post :)

http://www.bencehersey.net

June 2, 2008 at 7:42 PM
Unknown said...

Yout post thanx dostum

http://bencehersey.net/heh/windows-security-alert-virusu-temizleme-yontemi

June 2, 2008 at 7:45 PM
Mandar Thosar said...

Thanks for the information. How can I protect visitors on my site? I am providing plain text content through html pages. But still are there any ways through which I can curb misuse.

Express your feelings

June 5, 2008 at 10:41 AM
alastairc said...

It would be useful for any followup if you could distinguish between those who are victims of hacked servers compared to those who are intentionally distributing malware.

This could of course be impossible to detect reliably, but I'd still love to know...

July 16, 2008 at 1:15 PM
Anonymous said...

• The mushrooming of the software development companies have been instrumental in raising the bar for the quality of the software services. The increase of the concerns providing software services have made it possible for the clients to choose the best software development company from among the lot. In the cut throat competition only the best can survive and hence the companies give their best in order to thrive amidst this competition.

July 17, 2008 at 6:59 AM
Jane B said...

Hi Nagendra,
Your study on web server software & malware is quite impressive. It would be more helpful if you suggest any good solution to this problem..

offshore software development

July 24, 2008 at 7:33 AM
Business Process Outsourcing said...

Hi
Your blog is really contains lots of knowledge . I learn lots of think for this blog . I hope you will continue for such amaging knowledge with us .
Thanks...



Ravi kesarwani

http://www.ekamsoftwares.com

August 11, 2008 at 3:18 AM
web development services said...

Hi to all i am really impressed by this blog because i got a lot of information about new technologies like web development, web designing ,SEO. i want to introduce you to our company (AMCO IT SYSTEMS)
we are E commerce, E business and B2B and data entry company, we specialized in web developing, web designing,Seo.
if you have any inquiry please contact us.
Thanks

August 28, 2008 at 3:00 AM
Azwar said...

Once a bank has been alerted to the fact that it is the subject of a phishing attack, the race is on to close the target phishing site as quickly as possible. However, professional fraudsters will take steps to ensure that the process is as difficult and time consuming as possible: your time is their money.

Fraudsters will often host their sites in developing countries with limited law enforcement resources and incentivize the hosting company to keep the site running as long as it possibly can. Indeed, some unscrupulous hosting companies actually promote fraud hosting as a service.

Netcraft’s countermeasures service helps banks and other financial organizations to combat these techniques. Once a phishing site has been detected, Netcraft responds with a set of actions which will significantly limit access to the site immediately, and will ultimately cause the fraudulent content to be eliminated.

Netcraft’s approach is distinguished from other providers of takedown services through its ability to block access to the site for users of a wide range of technology immediately, and to provide information back to the bank that will identify compromised accounts.

September 11, 2008 at 4:51 AM
Integrated Business Software said...

Very interesting article. Good research, and I like the graphs.

September 16, 2008 at 10:47 AM
Anonymous said...

Yes, it is quite interesting to see the distribution of server software across different countries and the percentage of these servers software hosting malware. It is true that across Asia most people are inclined towards IIS rather than other operation systems. The amount of piracy that goes on here is tremendous and due to this auto update of the server does not happen and they become a target for hosting Malware, especially in a shared hosting environment. Original software can lower the percentage substantially. Web Designer.

January 7, 2009 at 5:45 PM
Ray Creations said...

Thanks for this interesting post.

February 8, 2009 at 3:43 AM
Ray Creations said...

thank you for sharing such an informative post, good research.

February 8, 2009 at 7:28 AM
Healthcare and IT Professionals said...

Hi,

It is very interested topic about to the distribution of the web server software.I think in this way the people can get a a lot of useful information about to the web server,For example,How many domain are attached to th web server,So it approximately 80 million.
Thanks again for this useful information.
Regards,
Shopping Cart.

April 3, 2009 at 12:38 AM
Unknown said...

Nobody mentioned the fact that IIS 6/7 is nested into the Window kernel (to run faster than others).

When a vulnerability is exploited in the kernel, attackers have full access to the highest privileges.

This is not the case with user-mode web servers.

More details on this issue here:

http://trustleap.ch/en_iis.html

By the way, IIS 7.0 is no longer the fastest web server under Windows (despite the kernel), see:

http://gwan.ch/

August 29, 2009 at 6:04 AM
travel30 said...

I think you have to view numbers in comparison to the total number of web
servers using Apache and IIS. As you can see in the graph which can be
found a bit higher, a lot more web servers are using Apache than IIS. If
actually the absolute number of malware distributing IIS servers is
equals to the number of Apache, the relative numbers are much worse for
IIS.

Thanks
Rohit from Outsourced Software Development company

August 31, 2009 at 3:09 AM
Empress Cruises & Events said...

Thanks for posting very useful post. Now days there are numbers of Pirated Windows Software available and most of them doesn't have automatic update option to download patch.

Cloud Computing Services

December 14, 2009 at 6:10 AM
Chocolate Cake said...

I am getting this "Sorry" message more and more often now. I do not believe that there is any "worm" in my system and it is a real nuisance. It is forcing me to switch to Yahoo or Ask. I do all my searche by hand and they are very innocent searches too. The sorry message does not even end with a CAPTCHA thingy to put my verification code to prove I am human. This is seriously getting on my nerves! I never had this problem before. Its only started recently, but I have no idea what triggered it.

April 21, 2010 at 8:40 PM
Unknown said...

Thanks for the information, we will add this story to our blog, as we have a audience in this sector that loves reading like this” web development

July 15, 2010 at 1:24 PM
Offshore software development India said...

Thanks for this awesome post. Nicely explained the topic and very helpful for beginners.
Please continue writing.

Regards:-Offshore software development company

August 13, 2010 at 4:23 PM
Goa Ad said...

it seems thats there is a lot to be done for protecting users from various exploits. Many antiviruses do not recognize or provide protection against web malwares.

December 16, 2010 at 11:26 AM
Unknown said...

It’s so highly informative things are posted here. These things are the fresh and having good information are posted here, and also am seeking for this kind of information thanks for updated..

lms software development services

November 7, 2013 at 1:02 AM
Rajinder Singh said...

Nice stuff you sharing. But i expect more then this information.....




Best Logo Design Company in India

May 8, 2014 at 6:55 AM

Post a Comment

  

Labels


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2024
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2023
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2022
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2021
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2020
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2019
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2018
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2017
    • Dec
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2016
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2015
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2014
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • Apr
    • Mar
    • Feb
    • Jan
  •     2013
    • Dec
    • Nov
    • Oct
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2012
    • Dec
    • Sep
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2011
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
  •     2010
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • May
    • Apr
    • Mar
  •     2009
    • Nov
    • Oct
    • Aug
    • Jul
    • Jun
    • Mar
  •     2008
    • Dec
    • Nov
    • Oct
    • Aug
    • Jul
    • May
    • Feb
  •     2007
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms
OSZAR »