Feeds

Microsoft wins court order crushing mighty spam botnet

Waledac's 276 domain names seized

HP ProLiant Gen8: Integrated lifecycle automation

A federal magistrate judge has recommended that Microsoft be given ownership of 276 internet addresses used to control “Waledac,” a massive botnet that the software company has been working to bring down.

The recommendation by Magistrate Judge John F. Anderson of the US District Court for Eastern Virginia is a victory in Microsoft's experimental campaign to wrest control of one of the net's biggest menaces. The effort, which commenced in February, has combined technical and legal maneuvers in an attempt to disrupt Waledac, which was once one of the 10 biggest botnets and a major distributor of spam.

Just a few weeks after the launch of Operation b49, as Microsoft dubs the takedown, as many as 90,000 zombie PCs lost contact with the command and control channels used to send malware updates that keep them infected. It was the result of a novel move, in which Microsoft lawyers sought a temporary order that seized control of 277 domain names used to administer the channels.

“To date, we have seen virtually no reemergence of Waledac traffic,” Jeff Williams, principal group program manager for Microsoft's Malware Protection Center, wrote on Wednesday. “This puts the Waledac takedown among a very few successful efforts to shut down a botnet without having it re-emerge.”

The failure of Waledac to rise from the grave is in stark contrast to other takedown efforts. In March, for instance, a series of Zeus botnets was resurrected less than 48 hours after security white hats tried to take it down.

Of the 277 domain names Microsoft pursued, only one was claimed, and that was by an Oregon man who ran a website that had been compromised, Williams said. The remaining owners still have a week or so to come forward, but that doesn't seem likely. If adopted, Anderson's recommendation would make February's temporary order permanent. Microsoft has more about the development here.

Operation b49 has another component that is equally novel. Armed with data captured from the command and control servers, Microsoft has detailed information about the hundreds of thousands of PCs that were infected by Waledac. The company is now reaching out to the ISPs of those head-spinning, demonized machines so they can seek a proper exorcism.

Cox Communications, a US-based provider that has long quarantined infected subscribers in rubber rooms, has already contacted several hundred customers to guide them to free tools from Microsoft that will disinfect the machines.

Operation b49 is the first initiative of a larger project known as MARS, or Microsoft Active Response for Security. Williams said there's more to come. ®

The Essential Guide to IT Transformation

More from The Register

next story
Brit celebs' homes VANISH from Google's Street View
Tony Blair's digs now a Tone-y Blur
German government orders local CIA station chief to pack his bags
Sour Krauts arrest second local in domestic spy ring probe
Doctor Who season eight scripts leak online
BBC asks fans to EXTERMINATE copies before they materialise
Snowden leaks latest: NSA, FBI g-men spied on Muslim-American chiefs
US Navy veteran? Lawmaker? Academic? You're all POTENTIAL TERRORISTS
UK's emergency data slurp: IT giants panicked over 'legal uncertainty'
PM says rushed-through DRIP law will 'plug holes' in existing legislation
Russian MP fears US Secret Service cuffed his son for Snowden swap
Seleznev Jnr is 'prolific trafficker in stolen credit card data', it is alleged
Teensy card skimmers found in gullets of ATMs
Hi-tech fraudsters treading more softly, but gas still yielding bang for buck
Adobe Flash: The most INSECURE program on a UK user's PC
XML a weak spot, but nothing's as dire as Adobe player
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
The Power of One Brief: Top reasons to choose HP BladeSystem
Download this brochure to find five ways HP BladeSystem can optimize your business with the power of one.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.