Cleaning up Switzerland’s internet sites


Viruses and other malware are lurking not just on porn sites, but in places you might never expect. To make it safer to surf, the Switch foundation monitors the Swiss web for malicious code. As a result, Swiss computers are the least infected in the world.

This content was published on September 4, 2012 minutes

“Error: the webpage cannot be displayed”. It’s not uncommon to get this kind of message when surfing on the web. So you check that the address has been typed correctly and try again, but the page still does not come up. Annoying? Yes, but it might be for your own good.

There are a number of reasons why a site may be inaccessible: connection problems, servers down, or updates in progress. But the site may also have been blocked deliberately for the sake of IT security.

“Some sites have got malicious code hidden in them that can infect a computer. The consequences can be serious: personal data and passwords may be stolen, or the whole system may crash”, explained IT expert Michael Hausding, who belongs to the Computer Emergency Response Team (CERT) at Switch, the organisation that looks after Switzerland’s Internet access. “My job is to block infected sites and prevent the spread of malware and other harmful code.”

Although invisible to the Internet user, CERT is successfully holding the line for Switzerland against malware. According to the most recent report of the Panda Security company, Switzerland is the country with the least number of infected computers in the world (see sidebar). “Apart from our work there are the actions of the major Internet service providers, who inform their customers periodically about the current threats”, adds Hausding.

500 dollars for a global attack

The methods for distributing malware are legion, as Hausding pointed out. “Spreading them through ‘drive-by downloads’ has increased recently. Exploiting a gap in the content management software, hidden code is placed on the website without changing the look or feel of it. When users visit the infected page, the code can install viruses and Trojan horses on their computers.”

These “drive-by” attacks, which are responsible for spreading three quarters of the malware in circulation, now tend to be automated. “There are actually companies which will create scripts to spread harmful code all over the web for 500 dollars,” Hausding warned.

The goal of these people is to create a network of infected computers, he explained. Whoever controls one of these “botnets” can get into the data stored on systems or use the computers’ connections - for example, to spy on bank transactions or send infected e-mail and spam on a huge scale.

“Last year there were a number of DDoS (Distributed Denial of Service) attacks on the Swiss Federal Railways and PostFinance. When this happens, the web site or server is knocked out by bombarding it with requests.”

Contrary to popular belief, porn sites or sites offering pirated music, films, programmes and so on are not necessarily the most dangerous, according to Hausding. “Malicious code can just as easily be found on the web sites of voluntary associations, sports clubs and small businesses. Whoever created the site was just using out-of-date software or unsecured passwords.”

The owners of these domain names, he emphasised, are not criminals. “They are the unwilling helpers of whoever is controlling the botnet. But then it’s our job to step in.”

Cleaning up their act

On Michael Hausding’s computer screen there is a list of Internet addresses. These are suspect sites which specialised firms and some individuals have identified and told Switch about. “On average we get fifty of these notifications a week.”

Once they have confirmed that these pages can really infect a computer, the CERT experts inform the owner or the administrator of the domain name. “It’s up to them to remove the malicious code from the site”, said Hausding. “For technical staff, this is a fairly straightforward operation that can be done quickly. People who don’t know much about computing ask us to come in and help.”

If there is no response within 24 hours, Switch takes down the whole domain. The web page is no longer accessible.

“If there is no reaction even to this, we ask the owner to identify him or herself with proof of residence or proof of company registration as the case may be. If no such identification is forthcoming, the domain name itself is scrapped.”

Between February 2011 and July 2012, CERT cleaned up 2,828 Swiss sites. “The owners of domain names usually get back to us in a hurry. Often enough, having a web site down means losing money,” Hausding said, adding (but without mentioning any names) that among those contaminated have been the sites of major Swiss firms.

Unique approach

The measures taken to fight malware in Switzerland are unique in the world, according to Hausding.

“Switzerland is the only country in which there is a clear legal framework. The 2010 revision of the regulations on addresses in the telecommunication sector has given us the power to block domain names.”

In Switzerland responsibility for a site rests with whoever has registered it. In other countries, it rests with the Internet hosting provider. “That turns out to be an important feature, when you think that a third of the 1.7 million Swiss domains are hosted on servers in other countries,” Hausding pointed out.

At the end of the interview, we asked Hausding to do us a favour: check the state of health of  the site. It was a relief to see all the buttons in the analysis programme turning green. The site is safe and there is no malware lurking on it. Not at the moment, anyway.


This foundation, founded in 1987 and with headquarters in Zurich, is tasked with creating, promoting and overseeing information and communication technologies for Swiss academic sites.

It also administers the naming of Internet sites in Switzerland (.ch) and Liechtenstein (.li).

In all it adminsters about 1.7 million domain names (addresses of web sites).

End of insertion

Switzerland is secure

32% of computers in the world have been infected by malware (viruses, worms and Trojan horses), says the Panda Security company in its last report (April-June 2012).

Switzerland is the country with the least number of computers infected (18.4%). The countries hardest hit are South Korea (57.3%), China (51.9%) and Taiwan (42.9%).

Further down the list are: Spain (33.3%), US (30%), Italy (29.8%), France (28.4%), Portugal (27.6%), Japan (27%), Germany (22,6%) and Britain (21%).

End of insertion

A fight that knows no borders

The Council of Europe’s Convention on Cybercrime (2001) was the first international treaty on computer and Internet crime.

This agreement, which Switzerland has signed and ratified, obliges the signatory states to make computer-related fraud, data theft, forging of documents by computer or access to protected IT systems offences under the law.

The Europol Cybercrime Centre comes into operation in January 2013. This centre, based in the Hague, will focus on illegal activities on the web carried out by organised criminal groups, in particular attacks on online banking and financial transactions.

It will seek ways of better protecting social network profiles from criminal manipulation, and it will provide information and analysis to national governments.

In June 2012, the Swiss government adopted a “national strategy against cyber-risk”. Its priorities include improved collaboration between government, industry and those who manage critical infrastructures.

End of insertion
In compliance with the JTI standards

In compliance with the JTI standards

More: SWI certified by the Journalism Trust Initiative

Contributions under this article have been turned off. You can find an overview of ongoing debates with our journalists here. Please join us!

If you want to start a conversation about a topic raised in this article or want to report factual errors, email us at

Share this story

Change your password

Do you really want to delete your profile?