Your PC may come with malware pre-installed

Share This Post


It is rare to find a new PC that doesn’t come with additional bells and whistles in addition to the operating system itself. The “bloatware” that PC vendors add on often includes useful tools like third-party security software. It seems, though, that some PCs also come with something more insidious—pre-installed malware. Microsoft researchers investigating counterfeit software in China were stunned to find that brand new systems being booted for the first time ever were already compromised with botnet malware right out of the box. Microsoft has filed a computer fraud suit against a Web domain registered to a Chinese businessman.
The suit alleges that the Nitol malware on the new PCs points the compromised systems to 3322.org. Microsoft believes the site is a major hub of malware and malicious online activity. Microsoft claims that site in question hosts Nitol, as well as 500 other types of malware. A Washington Post report states that it’s the largest single repository of malicious software ever encountered by Microsoft.

Most users—particularly most users of the Microsoft Windows operating systems—are aware of the many online threats. They’ve been conditioned to install antimalware and other security software, and update it frequently to ensure it can detect and block the latest, emerging threats. It’s a problem, though, if the PC is already compromised with malware before the antimalware software is even installed or enabled. Part of the concern lies in how the pre-installed malware works, or how deeply embedded it is. Most malware can still be identified and removed by security software after the fact. However, malware threats that are planted at the kernel level of the operating system, or in the PC BIOS operate at a level that is too deep, and can avoid detection by most antimalware tools.
Malicious software is big business, and the criminals running the business are often quite clever and innovative when it comes to finding new ways to spread it. Planting malware in PCs, smartphones, or tablets before they’re even purchased and unboxed is certainly one way to go about it.
What can you do then to defend against these threats? For starters, buy your PC, tablet, or smartphone hardware from established, respected vendors. If you buy an HP, Dell, Acer, Sony, or other such brand name PC the odds of it being compromised with pre-installed malware out of the box are pretty low. If you buy an Apple iPad, Google Nexus 7, or Amazon Kindle Fire you will most likely get a device free of malware infections. But, if you go bargain shopping online and buy a PC or knock-off tablet from a shady, unknown site the risk is higher.
Regardless, don’t assume that just because your PC or mobile device is brand new that it must be safe and free from malware. And, you might not want to trust the pre-installed security software, either, since you can’t verify that it’s legitimate and free from malware itself. Make sure you install a reliable cross-device security tool to detect and identify malware that may already be present.

Stay Ahead: Join the EwtNet Insider Email Club!

Stay informed and up-to-date with EwtNet's email subscription. Join our exclusive community and receive curated news, updates, and insights tailored to your interests.

Related Posts

How to Partition a new SSD or hard drive without OS

Partitioning hard drives, with a functioning operating system, is...

Samsung unveils the Exynos 8 Octa CPU

Today, Samsung announced the Exynos 8 Octa 8890 CPU...

Easiest Way TO Eliminate Eyestrain From Your PC / Computer

Building an amazing desktop computer is easy, but even...

Review On Best Gaming Laptops with Strong Battery

The term " Gaming Laptop" is used to describe...

Intel’s first ‘open-source PC’ on sale for $199

Just incase you haven't check PcWorld today, here is...

Best Antivirus for Android: What to Look Out For

The importance of an antivirus app for your Android...
- Advertisement -

Discover more from EwtNet

Subscribe now to keep reading and get access to the full archive.

Continue reading