Microsoft chops Rustock botnet in half
Rustock is half the size it was in March thanks to the Microsoft led Operation b107.
The Rustock botnet is now less than half the size it was in March, thanks to the Microsoft led takedown in that month.
The giant spamming botnet was dealt a serious blow when Operation b107 severed the connection between Rustock's command and control structure and hundreds of thousands of computers operating under its control.
The number of systems powering the Rustock botnet was reduced from 1,601,619 to 702,860 between March and June, according to known IP address infections recorded by Microsoft.
This represented a 56.12 per cent reduction. In India, where Rustock infections were most prominent, the reduction was as high as 69.3 per cent.
"That's great news and the infection reduction has happened much more quickly than it did for Waledac over a similar period of time last year, but we still have a long way to go," said Richard Boscovich, senior attorney for the Microsoft Digital Crimes Unit, in a blog post.
Boscovich called for greater collaboration within the cyber security industry to help take down the bad guys.
"The good news is that we are making progress. The tech industry, policy makers and consumer advocacy groups have helped curb cyber threats through the development of safer products and by increasing public awareness of cyber crime," Boscovich added.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"As we continue our efforts to fight cyber crime, one thing is clear: these threats cannot be tackled alone. It was through the combined effort of Microsoft, the judicial system and the industry that Rustock was successfully taken down."
The International Cyber Security Protection Alliance (ICSPA) was launched yesterday, hoping to facilitate a more collaborative approach, linking up Governments with industry and businesses.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
What does modern security success look like for financial services?Sponsored As financial institutions grapple with evolving cyber threats, intensifying regulations, and the limitations of ageing IT infrastructure, the need for a resilient and forward-thinking security strategy has never been greater
-
Yes, legal AI. But what can you actually do with it? Let’s take a look…Sponsored Legal AI is a knowledge multiplier that can accelerate research, sharpen insights, and organize information, provided legal teams have confidence in its transparent and auditable application
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up stingNews Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
-
Horabot campaign targeted businesses for more than two years before finally being discoveredNews The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
-
Brand-new Emotet campaign socially engineers its way from detectionNews This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomwareNews The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
-
Beating the bad bots: Six ways to identify and block spam trafficIn-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against RussiaNews The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
-
Microsoft's secure VBA macro rules already being bypassed by hackersNews Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
-
Emotet infrastructure has almost doubled since resurgence was confirmedNews Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation
