Skip to main content

Microsoft still after Rustock botnet operators

Microsoft’s stealth attack against the infamous Rustock botnet seems to have worked—the botnet has remained offline. However, Microsoft’s Digital Crimes Unit is still going after the operators, who it believes operated (and perhaps are still operating) out of Russia—and this time it’s through the press and legal process, sending notices of court orders to folks believed to be involved, and taking out 30-day ads in leading Russian newspapers in an effort to get the owners of the IP addresses that controlled Rustock to come out of the woodwork.

Microsoft Spambot infographic (Rustock) (March 2011)
Image used with permission by copyright holder

“Although history suggests that the people associated with the IP addresses and domain names connected with the Rustock botnet are unlikely to come forward in response to a court summons, we hope the defendants in this case will present themselves,” Microsoft senior attorney Richard Boscovich wrote in the company’s official blog. “If they do not, however, we will continue to pursue this case, including possibly within the Russian judicial system.”

Recommended Videos

Sending notices to the physical and email addresses associated with the IPs that controlled the botnet and taking out the ads helps Microsoft meet its legal obligations to make a “good faith” effort to contact the owners of the addresses. Microsoft’s take-down of the Rustock botnet essentially involved a coordinated take-down of its command-and-control servers, many of which were actually operating in the United States. Microsoft coordinated with security researchers, upstream providers, and law enforcement to conduct a coordinated seizure. While the takedown was conducted with court authority, the company now has to go through the due diligence to contact the owners of the IP addresses and systems involved so, if they like, they can get their day in court.

Nobody is really expecting the Rustock operators to turn up, however.

Microsoft has noted that since the takedown, the number of PCs infected with the Rustock botnet has declined substantially as more PC users update their software and remove malware from PCs. Global levels of spam also saw a significant decline in the first quarter of the year, in part due to Rustock being taken down.

Rustock’s command-and-control servers might be offline, but that doesn’t take malware off infected PCs, and there’s still a danger that, somehow, the Rustock operators might be able to re-capture their botnet of infected systems and resume their spamming. Unlike the CoreFlood botnet, there doesn’t appear to be a backdoor into Rustock that enables substitute command-and-control servers to issue shutdown or removal commands to infected machines—and do you really want someone sending commands to delete malware on your system, anyway?

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
Microsoft quits its creepy, emotion-reading A.I.
blonde woman with an expressionless face looks at camera while laser lights scan her features

Microsoft announced it will stop the development and distribution of controversial emotion-reading software as big tech companies pivot toward privacy and security. The company also says it will heavily restrict its own facial recognition platform.

Microsoft’s shift away from emotional recognition software is another sign of big tech’s growing prioritization of privacy. The company also admits there is little scientific evidence behind the technology.

Read more
Microsoft Defender finally feels like proper antivirus software for individuals
The Windows Security app in Windows 11.

With password attacks and ransomware on the rise, Microsoft has announced the general availability of Microsoft Defender for individuals, a premium, cross-platform, consumer security application for Windows, Android, iOS, and Mac.

Available for paid Microsoft 365 Personal and Family subscribers, this new security offering from Microsoft is the latest step in a journey to bring its security features to all of its users. Building on what's been done with the Windows Security app on Windows, Microsoft Defender for individuals will bring together multiple protections into a single online dashboard.

Read more
Microsoft Edge just got a new way to protect your privacy
Microsoft Edge Secure Network graphic.

Microsoft Edge just got even more secure. After a tease a few weeks ago, Microsoft has just officially announced the availability of Edge Secure Network, the new built-in VPN feature for the Microsoft Edge browser.

Though still in an experimental stage with a small audience using the Canary version of the browser, Microsoft hopes this feature can provide extra peace of mind when using Edge on unsecured networks. As with most other VPN services, this built-in Secure Network can mask your device's IP address, encrypt your data, and route it through a secure network that's geographically co-located.  This will make it harder for hackers and others with bad intent to see your true location. The company that provides your internet also won't be able to collect your browsing data for ads.

Read more