Vulnerabilities / Threats
3/18/2011
01:06 PM
Connect Directly
RSS
E-Mail
50%
50%

Microsoft, Feds Knock Rustock Botnet Offline

Authorities confiscated equipment from seven Internet hosting facilities used by the botnet, which was responsible for much of the Viagra email spam on the Internet.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010
Microsoft and federal law enforcement authorities confiscated equipment from seven Internet hosting facilities across the United States on Wednesday, resulting in a takedown of the Rustock botnet.

Microsoft had filed a lawsuit in civil court against "John Does … controlling a computer botnet and thereby injuring Microsoft and its customers." The lawsuit was unsealed on Thursday by a federal judge, at Microsoft's request.

Richard Boscovich, senior attorney in the Microsoft Digital Crimes Unit (DCU), said in a blog post on Thursday that "the Rustock botnet was officially taken offline yesterday, after a months-long investigation by DCU and our partners, successful pleading before the U.S. District Court for the Western District of Washington, and a coordinated seizure of command and control servers in multiple hosting locations escorted by the U.S. Marshals Service."

The operation to bust Rustock, which infected an estimated one million computers, built on knowledge Microsoft gained when it took down Waledac last year. "Like the Waledac takedown, this action relied on legal and technical measures to sever the connection between the command and control structure of the botnet and the malware-infected computers operating under its control," said Boscovich.

Security firm FireEye and the University of Washington filed declarations of support for Microsoft's suit, as did drug-maker Pfizer, since the bulk of Rustock's spam purported to sell drugs such as the company's Viagra.

In Pfizer's declaration, Patrick Ford, senior director in the Americas region for Pfizer Global Security, said that investigations conducted by Pfizer in the U.S. and France procured drugs advertised as Viagra via spam emails. In both cases, the spam emails resolved to the same Web site: doctorroe.com. The procured samples, which were tested at Pfizer labs, turned out to be either counterfeit versions from China and Hong Kong, or unapproved, generic versions from India.

Rustock first went dark on Wednesday, a development first reported by security writer Brian Krebs .

While many botnets serve as conduits for enormous quantities of email spam, of late Rustock was the most prolific, at times generating 2,000 messages per second. "For the last year or so, Rustock has been the dominant source of spam in the world, by the end of 2010, accounting for as much as 47.5% of all spam," said Paul Wood, MessageLabs Intelligence senior analyst at Symantec, in a blog post. "At its peak it was responsible for more than half of all global spam."

But unfortunately, according to multiple security firms, Rustock's takedown didn't appear to impact global spam levels, which have remained steady, despite the takedown.

"The takedown of Rustock hasn't had much noticeable effect on the overall amount of spam tracked by MessageLabs Intelligence," said Wood on Thursday. "So far in fact, traffic looks normal."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

Best of the Web
Dark Reading Radio