A new study conducted by Microsoft dubbed Operation b70, from Aug. 2011, shows that several computers carry malware installed in the factory, BBC News reported.
As part of efforts to determine security in its supply chain, the company undertook a study, when its employees brought 10 laptops and 10 desktops from stores located at various cities in China. The new laptops and desktops were found to contain malware and specifically a botnet by name Nitol that resulted in a court order giving the company permission to adopt technical measures to disrupt the botnet.
Richard Boscovich, assistant general counsel for Microsoft Digital Crimes Unit, told CNET in an interview: "We went into what they call 'PC Malls.' We wanted to get a sampling of what an average consumer in China would get. We were surprised how quickly we were able to find something to back up the suspicion."
Apparently, Nitol steals personal details to help criminals break into online bank accounts.
A blog post by the company noted how it disrupted over 500 different strains of malware that held potential for attacking millions of PC users. This is the second successful botnet disruption the company has undertaken in last six that has significantly limited the spread of Nitol botnet.
Continue Reading Below
"What's especially disturbing is that the counterfeit software embedded with malware could have entered the chain at any point as a computer travels among companies that transport and resell the computer," the company added in its blog post.
Also, investigations revealed that the botnet behind Nitol originated from a web domain that was involved in cybercrime since 2008. Further the domain hosted 70,000 separate sub-domains used by 500 separate strains of malware to fool victims or steal data.
"We found malware capable of remotely turning on an infected computer's microphone and video camera, potentially giving a cybercriminal eyes and ears into a victim's home or business," the blog post pointed out.
Reportedly, a U.S. court granted permission to Microsoft Sept.10, to seize control of the web domain, 3322.org, which it identifies as involved in Nitol infections. This enables separation of legitimate data and blocking stolen traffic by viruses.
Peng Yong, the Chinese owner of the 3322.org domain, told the Associated Press (AP) that he knew nothing about Microsoft's legal action and assured that his company engaged in a "zero tolerance" attitude towards illegal activity on the domain.
"Our policy unequivocally opposes the use of any of our domain names for malicious purposes," Peng told AP, according to BBC News.
Admitting that high number of users on its domain limited its surveillance operations, Peng said: "We currently have 2.85 million domain names and cannot exclude that individual users might be using domain names for malicious purposes."