Microsoft Offers Bounty For Rustock Operators

Microsoft is offering a bounty for the operators behind the Rustock botnet, which the company helped disable in March. Before it went offline, the botnet was capable of sending billions of spam emails per day.

In exchange for information that leads to the identification, arrest and conviction of those individuals, Microsoft is now willing to pay some $250,000 (£155,000). This comes on the heels of Microsoft’s civil lawsuit filed against Rustock’s anonymous operators. The company claims that, in addition to sending untold amounts of spam messages, Rustock was also responsible for crimes ranging from advertising counterfeit drugs for sale, to trademark violations.

Hundreds of thousands of computers worldwide remain infected with the botnet’s malware.

Controlling A Million Botnets

“This reward offer stems from Microsoft’s recognition that the Rustock botnet is responsible for a number of criminal activities and serves to underscore our commitment to tracking down those behind it,” Richard Boscovich, senior attorney for Microsoft’s Digital Crimes Unit, wrote in an email posted on The Official Microsoft Blog. “The legal action Microsoft has taken in civil court has already been successful, helping us take down the Rustock botnet and disrupt its operations.”

Before its shutdown, estimates of Rustock’s size varied between 1.1 million and 1.7 million infected computers, and the botnet may have been responsible for 47.5 percent of all spam sent worldwide by the end of 2010. Microsoft blocked the IP addresses controlling the botnet, in conjunction with a coordinated seizure of Rustock command-and-control servers located at five hosting providers in seven US cities.

The takedown operation, referred to as Operation b107, was part of Project MARS (Microsoft Active Response for Security), a joint effort between Microsoft’s Digital Crimes Unit, Microsoft Malware Protection Centre and Trustworthy Computing.

Microsoft’s previous big-botnet killing, in February 2010, kicked off when a federal judge in Virginia issued a temporary restraining order that cut off the 277 Internet domains associated with Waledac, which was blamed for producing more than 1.5 million spam messages per day. Having infected hundreds of thousands of computers around the world, Waledac was considered a big enough threat to attract the attention of not only Microsoft, but also Symantec, Shadowserver Foundation, the University of Washington and a handful of others joined together in an initiative termed “Operation b49”.

At the time, security experts questioned whether such legal manoeuvres would ultimately be sufficient to curb the increasingly endemic issue of botnets. Microsoft’s latest bounty on Rustock’s operators suggests the company is taking ever-harder steps to deal with the threat.

Nicholas Kolakowski eWEEK USA 2013. Ziff Davis Enterprise Inc. All Rights Reserved.

Recent Posts

Italy, White House Condemn ‘Discriminatory’ Tech Taxes

Italy, White House issue joint statement condemning 'discriminatory' tech taxes as US seeks to end…

4 hours ago

Italian Newspaper Hails ‘Success’ With AI-Generated Supplement

Italian newspaper Il Foglio says four-page AI-generated supplement published every day for a month shows…

4 hours ago

Huawei Updates Smart Glasses With Live Translation

Huawei launches Titanium edition of Eyewear 2 smart glasses with gesture controls and AI-powered simultaneous…

5 hours ago

Head Of Chinese Chip Tools Company Drops US Citizenship

Gerald Yin, founder, chairman and chief executive of key Chinese chip tools maker AMEC, drops…

5 hours ago

Intel Tells Chinese Clients Some AI Chips To Require Licence

Intel reportedly tells clients in China some of its AI chips will now require export…

6 hours ago

Intel Chief Flattens Leadership Structure

New Intel chief executive Lip-Bu Tan flattens company's leadership structure as he seeks to end…

6 hours ago