Global Information Lookup Global Information

Rustock botnet information


The Rustock botnet was a botnet that operated from around 2006[1] until March 2011.

It consisted of computers running Microsoft Windows, and was capable of sending up to 25,000 spam messages per hour from an infected PC.[2][3] At the height of its activities, it sent an average of 192 spam messages per compromised machine per minute.[4] Reported estimates on its size vary greatly across different sources, with claims that the botnet may have comprised anywhere between 150,000 and 2,400,000 machines.[5][6][7] The size of the botnet was increased and maintained mostly through self-propagation, where the botnet sent many malicious e-mails intended to infect machines opening them with a trojan which would incorporate the machine into the botnet.[8]

The botnet took a hit after the 2008 takedown of McColo, an ISP which was responsible for hosting most of the botnet's command and control servers. McColo regained Internet connectivity for several hours, and in those hours up to 15 Mbit a second of traffic was observed, likely indicating a transfer of command and control to Russia.[9] While these actions temporarily reduced global spam levels by around 75%, the effect did not last long: spam levels increased by 60% between January and June 2009, 40% of which was attributed to the Rustock botnet.[10][11]

On March 16, 2011, the botnet was taken down through what was initially reported as a coordinated effort by Internet service providers and software vendors.[12] It was revealed the next day that the take-down, called Operation b107,[13][14] was the action of Microsoft, U.S. federal law enforcement agents, FireEye, and the University of Washington.[15][16]

To capture the individuals involved with the Rustock botnet, on July 18, 2011, Microsoft is offering "a monetary reward in the amount of US$250,000 for new information that results in the identification, arrest and criminal conviction of such individual(s)."[17]

  1. ^ Chuck Miller (2008-07-25). "The Rustock botnet spams again". SC Magazine US. Archived from the original on 2012-07-30. Retrieved 2010-04-21.
  2. ^ "Real Viagra sales power global spam flood - Techworld.com". News.techworld.com. Archived from the original on 2012-04-07. Retrieved 2010-04-21.
  3. ^ "Marshal8e6 Releases New Insight and Analysis into Botnets". trustwave.com. Chicago, IL, USA: Trustwave Holdings. 2009-04-22. Archived from the original on 2016-04-20. Retrieved 2014-01-09.
  4. ^ "Symantec Announces August 2010 MessageLabs Intelligence Report". Symantec. Sunnyvale, CA, USA: Symantec. 2010-08-24. Archived from the original on August 28, 2010. Retrieved 2014-01-09.
  5. ^ "MessageLabs intelligence" (PDF). MessageLabs. April 2010. Retrieved 20 November 2010.
  6. ^ "Biggest spammer? The Rustock botnet |". Securityinfowatch.com. 2009-02-06. Archived from the original on 2020-06-18. Retrieved 2010-04-21.
  7. ^ "Rustock botnet responsible for 40 percent of spam". Good Gear Guide. Retrieved August 25, 2010.
  8. ^ "New Rustock Botnet Trying to Expand Itself". SPAMfighter. 2008-07-25. Retrieved 2010-04-21.
  9. ^ "Dead network provider arms Rustock botnet from the hereafter - McColo dials Russia as world sleeps". The Register. 18 November 2008. Retrieved 20 November 2010.
  10. ^ "Rustock botnet leads spam surge up 60 percent in 2009". MX Logic. 2009-07-14. Retrieved 2010-04-21.
  11. ^ "Grum and Rustock botnets drive spam to new levels > Botnet > Vulnerabilities & Exploits > News > SC Magazine Australia/NZ". securecomputing.net.au. 2010-03-02. Retrieved 2010-04-21.
  12. ^ Hickins, Michael (2011-03-17). "Prolific Spam Network Is Unplugged". Wall Street Journal. Retrieved 2011-03-17.
  13. ^ Williams, Jeff. "Operation b107 - Rustock Botnet Takedown". Retrieved 2011-03-27.
  14. ^ Bright, Peter (22 March 2011). "How Operation b107 decapitated the Rustock botnet". Ars Technica. Retrieved 2011-03-27.
  15. ^ Wingfield, Nick (2011-03-18). "Spam Network Shut Down". Wall Street Journal. Retrieved 2011-03-18.
  16. ^ Williams, Jeff. "Operation b107 - Rustock Botnet Takedown". Retrieved 2011-04-06.
  17. ^ "Microsoft Offers Reward for Information on Rustock". Retrieved 2011-07-18.

and 13 Related for: Rustock botnet information

Request time (Page generated in 0.7676 seconds.)

Rustock botnet

Last Update:

The Rustock botnet was a botnet that operated from around 2006 until March 2011. It consisted of computers running Microsoft Windows, and was capable...

Word Count : 884

Grum botnet

Last Update:

Grum and Rustock botnets - Security". Thetechherald.com. Archived from the original on 2010-07-21. Retrieved 2010-07-30. "MessageLabs: Botnets a threat...

Word Count : 721

Botnet

Last Update:

breaking it. Many large botnets tend to use domains rather than IRC in their construction (see Rustock botnet and Srizbi botnet). They are usually hosted...

Word Count : 4888

Microsoft Digital Crimes Unit

Last Update:

full extent of the law. The DCU has taken down many major botnets such as the Citadel, Rustock, and Zeus. Around the world malware has cost users about...

Word Count : 1253

Storm botnet

Last Update:

Storm botnet or Storm worm botnet (also known as Dorf botnet and Ecard malware) was a remotely controlled network of "zombie" computers (or "botnet") that...

Word Count : 4558

Alureon

Last Update:

(computer worm) Botnet Conficker Gameover ZeuS Regin (malware) Rustock botnet Srizbi botnet Storm botnet Trojan.Win32.DNSChanger ZeroAccess botnet Zeus (malware)...

Word Count : 1052

Spambot

Last Update:

'spambot'.[citation needed] Anti-spam techniques Botnet Dead Internet theory List poisoning Rustock botnet Spamtrap Spider trap Votebots "Tinder Is Being...

Word Count : 583

Srizbi botnet

Last Update:

behind another botnet, named Rustock. According to Symantec, the code used in the Srizbi trojan is very similar to the code found in the Rustock trojan, and...

Word Count : 2246

Trellix

Last Update:

FireEye participated to take down the Mega-D botnet (also known as Ozdok). On March 16, 2011, the Rustock botnet was taken down through action by Microsoft...

Word Count : 3703

Festi

Last Update:

botnets and their impact, December 9, 2009, Top 10 botnets and their impact, Help Net Security The top 10 'most wanted' spam-spewing botnets Rustock,...

Word Count : 1260

Donbot botnet

Last Update:

"Rustock - The King of All Other Botnets". SPAMfighter. January 1, 1990. Retrieved July 30, 2010. "The top 10 'most wanted' spam-spewing botnets". Networkworld...

Word Count : 267

McColo

Last Update:

buyers due to being widely blacklisted. Botnet Oleg Nikolaenko, whose arrest also reduced worldwide spam Rustock botnet, one of the largest spambots ever built...

Word Count : 645

Timeline of computer viruses and worms

Last Update:

sensitive data) and installs more malware on the victim's computer. May 6: Rustock.C, a hitherto-rumored spambot-type malware with advanced rootkit capabilities...

Word Count : 7684

PDF Search Engine © AllGlobal.net