Feeds

Microsoft turns screws on bot herders with hefty reward

$250,000 for arrest of notorious Rustock operators

Next gen security for virtualised datacentres

Microsoft is offering a $250,000 reward for information leading to the arrest of those who controlled Rustock, a recently dismantled botnet that in its heyday was one of the biggest sources of illegal spam.

Monday's announcement of the bounty comes four months after Microsoft waged a novel campaign to take down Rustock, which enslaved an estimated 1 million PCs. The number of infected machines has been cut in half since that time, and Microsoft has already taken out ads in Russian newspapers in an attempt to track down the operators of the notorious botnet.

Now Microsoft is redoubling those efforts with the promise of the hefty quarter-million dollar bounty to anyone who can help Microsoft and law enforcement officials identify and catch the perps.

“This reward offer stems from Microsoft’s recognition that the Rustock botnet is responsible for a number of criminal activities and serves to underscore our commitment to tracking down those behind it,” Richard Boscovich, a senior attorney in the Microsoft Digital Crimes Unit, wrote in a blog post. “While the primary goal for our legal and technical operation has been to stop and disrupt the threat that Rustock has posed for everyone affected by it, we also believe the Rustock bot-herders should be held accountable for their actions.”

According to Microsoft, Rustock was at times capable of sending 30 billion spam messages per day. Among other things, it pitched discounted pharmaceutical drugs that were fakes or unlicensed, posing a hazard to those who used them.

The March takedown of the botnet wielded court orders that allowed authorities to seize servers at five hosting providers that were used to administer the sophisticated botnet. Although the IP addresses hardwired into the underlying malware have been severed, hundreds of thousands of infected PCs have yet to be cleaned, Boscovich said.

The Rustock takedown came a little more than a year after Microsoft used similar tactics to dismantle another notorious botnet known as Waledac. In April, federal authorities borrowed many of the same techniques to shut down the Coreflood botnet. The Coreflood takedown went even further by giving the feds legal permission to establish a substitute control channel that temporarily disabled the underlying malware running on hundreds of thousands of infected end-user computers.

A PDF of Microsoft's official notice is here.

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.