Microsoft Details Rustock Botnet Findings

In a blog post, video, and special edition of its Security Intelligence Report, Microsoft today highlighted how it took down the Rustock botnet earlier this year and discusses what it's learned since.

ITPro Today

July 5, 2011

2 Min Read
ITPro Today logo in a gray background | ITPro Today

In a blog post, video, and special edition of its Security Intelligence Report, Microsoft today highlighted how it took down the Rustock botnet earlier this year and discusses, for the first time, what it's learned since.

These resources are linked below.

Microsoft Releases New Threat Data on Rustock (Official Microsoft Blog)

In short, since the time of the initial takedown, we estimate the Rustock botnet is now less than half the size it was when we took it down in March. That’s great news and the infection reduction has happened much more quickly than it did for Waledac over a similar period of time last year, but we still have a long way to go.

The good news is that we are making progress. The tech industry, policy makers and consumer advocacy groups have helped curb cyber threats through the development of safer products and by increasing public awareness of cybercrime. As we continue our efforts to fight cybercrime, one thing is clear: these threats cannot be tackled alone. It was through the combined effort of Microsoft, the judicial system and the industry that Rustock was successfully taken down. Cooperation is the key to success and we will continue to develop and leverage partnerships, while sharing our knowledge and expertise, so we as an industry can advance in the war against cybercrime with the ultimate goal of creating a safer, more trusted Internet for everyone.

Rustock Botnet Infections Timeline Video (Microsoft PressPass)

Special Edition Security Intelligence Report: Battling the Rustock Threat (SIR)

On March 16, 2011, Microsoft Digital Crimes Unit (DCU) in cooperation with industry and academic experts had successfully taken down the Win32/Rustock botnet.  At the time of the takedown, Rustock was estimated to have had approximately a million infected computers operating under its control and known to be capable of sending billions of spam email messages every day, including fake Microsoft lottery scams and offers for fake – and potentially dangerous – prescription drugs.

Read an overview of the Win32/Rustock family of rootkit-enabled backdoor Trojans background, functionality, how it works, and threat telemetry data with analysis for 2010 to May 2011. This document provides legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like