Microsoft details Rustock botnet takedown

Powered by SC Magazine
 

A million bots at a loose end, still infected.

Microsoft has revealed how it decapitated one of the world’s largest botnets, Rustock, capable of sending out billions of pharmaceutical spam a day. 

The sudden end to Rustock spam late last week was the “denouement” of a multi-month joint effort codenamed "Operation b107" between Microsoft, drug company Pfizer and authorities in the US and the Netherlands. 

The takedown was both technical and legal, with Microsoft employing the same strategy it used against the Waledac botnet operators by filing a "John Doe" law suit against the anonymous operators of Rustock.

Arguing its case for a court order to be issued, Microsoft told a Washington Seattle District Court that the unknown botnet operator had caused harm to Microsoft and other members of the public in Washington.  

At its height in 2010, Rustock was responsible for 47.5 per cent of the world's spam, according to Symantec

After obtaining the court order, US Marshalls officers last week seized Rustock’s command and control servers from five hosting centres in seven locations across the US.

Microsoft said in its court fiing that Rustock had a four tier structure, with the lowest used to send spam, a middle "control" tier consistnig of command and control servers, and a "command" tier which was obscured by the control layer. 

“Rustock’s infrastructure was much more complicated than Waledac’s, relying on hard-coded Internet Protocol addresses rather than domain names and peer-to peer command and control servers to control the botnet,” Richard Boscovich, senior attorney for Microsoft’s Digital Crimes Unit explained.

“With help from upstream providers, we successfully severed the IP addresses that controlled the botnet, cutting off communication and disabling it.”

Rustock’s US servers were located in Kansas City, Scranton, Denver, Dallas, Chicago, Seattle and Columbus. In its legal filing Microsoft names each host, and lists around 2,500 domains and registries its operators had acquired.  

Netherlands Police Agency’s Dutch High Tech Crime Unit helped take down Rustock’s non-US infrastructure while and China's Computer Emergency Response Team (CN-CERT) has blocked the registration of Chinese domains that could have been used to revive Rustock's command and control servers. 

Pfizer chipped in to Microsoft’s legal bid by writing a declaration warning that the drugs being offered via Rustock’s spam contained the wrong active ingredients and incorrect doses.  

Microsoft's researchers believe there are up to one million Rustock-infected machines across the world and points to its support pages for how to remove the malware

Copyright © iTnews.com.au . All rights reserved.


Microsoft details Rustock botnet takedown
 
 
 
Top Stories
Innovating in the sleepy super industry
There’s little incentive to be on the bleeding edge, so why is Andrew Todd fighting so hard?
 
How technology will unify Toll
The systems headache formed through 15 years of acquisitions.
 
Immigration breached Privacy Act with data leak
Pilgrim slams "copy and paste" of asylum seeker data.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  7%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 842

Vote