Feeds

Microsoft wins court order crushing mighty spam botnet

Waledac's 276 domain names seized

Boost IT visibility and business value

A federal magistrate judge has recommended that Microsoft be given ownership of 276 internet addresses used to control “Waledac,” a massive botnet that the software company has been working to bring down.

The recommendation by Magistrate Judge John F. Anderson of the US District Court for Eastern Virginia is a victory in Microsoft's experimental campaign to wrest control of one of the net's biggest menaces. The effort, which commenced in February, has combined technical and legal maneuvers in an attempt to disrupt Waledac, which was once one of the 10 biggest botnets and a major distributor of spam.

Just a few weeks after the launch of Operation b49, as Microsoft dubs the takedown, as many as 90,000 zombie PCs lost contact with the command and control channels used to send malware updates that keep them infected. It was the result of a novel move, in which Microsoft lawyers sought a temporary order that seized control of 277 domain names used to administer the channels.

“To date, we have seen virtually no reemergence of Waledac traffic,” Jeff Williams, principal group program manager for Microsoft's Malware Protection Center, wrote on Wednesday. “This puts the Waledac takedown among a very few successful efforts to shut down a botnet without having it re-emerge.”

The failure of Waledac to rise from the grave is in stark contrast to other takedown efforts. In March, for instance, a series of Zeus botnets was resurrected less than 48 hours after security white hats tried to take it down.

Of the 277 domain names Microsoft pursued, only one was claimed, and that was by an Oregon man who ran a website that had been compromised, Williams said. The remaining owners still have a week or so to come forward, but that doesn't seem likely. If adopted, Anderson's recommendation would make February's temporary order permanent. Microsoft has more about the development here.

Operation b49 has another component that is equally novel. Armed with data captured from the command and control servers, Microsoft has detailed information about the hundreds of thousands of PCs that were infected by Waledac. The company is now reaching out to the ISPs of those head-spinning, demonized machines so they can seek a proper exorcism.

Cox Communications, a US-based provider that has long quarantined infected subscribers in rubber rooms, has already contacted several hundred customers to guide them to free tools from Microsoft that will disinfect the machines.

Operation b49 is the first initiative of a larger project known as MARS, or Microsoft Active Response for Security. Williams said there's more to come. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?