The number of spam e-mail messaging will he significantly reduced? As part of Operation "B107", Microsoft announced on Thursday, March 17, as one of the networks of infected computers' best known and most complex "had been disabled. The operation culminated with the intervention of U.S. authorities, who could take control of computer servers located in the State of Washington.
On Wednesday, the connection between servers and infected computers has been broken, according to the head of Microsoft. Computer networks robots (or "botnets" in English) consist of thousands of machines by a computer virus corrupted and controlled remotely. Typically, botnets are used to disseminate massive spam, these junk mail.
Rustock, which appeared in November 2005, had, according to security firms, about 1 million infected computers and was able to send billions of spam messages per day, containing advertisements for counterfeit pharmaceuticals for example. "Last year, Rustock was the main source of spam in Tech News Buzz, representing, in December 2010, 47.5% of all of these messages," explains Symantec.
To infect computers, "Rustock was able to hide its files and its activity deep into the Windows operating system," says SecureWorks also, making it difficult to detect anti-virus programs. FINAL COMMISSIONING OR SLEEP? Prior to the disabling Rustock, the year 2010 was marked by the closure of several other major botnets.
In late October, an investigation by the Dutch police has led to the closure of Bredolab network, which also sent spam for pharmaceuticals. A year earlier, Microsoft had also conducted a similar operation to stem the spread of malicious program Waledac, worm contained an attachment of email scams.
The effects of the closure of Rustock be permanent? "It is too early to tell," says Symantec. The botnet has alternated between periods of calm for several days before coming back stronger than ever. " "Only time will tell if this can happen again," concludes the antivirus company. Read also: The spam goes away and then returns
On Wednesday, the connection between servers and infected computers has been broken, according to the head of Microsoft. Computer networks robots (or "botnets" in English) consist of thousands of machines by a computer virus corrupted and controlled remotely. Typically, botnets are used to disseminate massive spam, these junk mail.
Rustock, which appeared in November 2005, had, according to security firms, about 1 million infected computers and was able to send billions of spam messages per day, containing advertisements for counterfeit pharmaceuticals for example. "Last year, Rustock was the main source of spam in Tech News Buzz, representing, in December 2010, 47.5% of all of these messages," explains Symantec.
To infect computers, "Rustock was able to hide its files and its activity deep into the Windows operating system," says SecureWorks also, making it difficult to detect anti-virus programs. FINAL COMMISSIONING OR SLEEP? Prior to the disabling Rustock, the year 2010 was marked by the closure of several other major botnets.
In late October, an investigation by the Dutch police has led to the closure of Bredolab network, which also sent spam for pharmaceuticals. A year earlier, Microsoft had also conducted a similar operation to stem the spread of malicious program Waledac, worm contained an attachment of email scams.
The effects of the closure of Rustock be permanent? "It is too early to tell," says Symantec. The botnet has alternated between periods of calm for several days before coming back stronger than ever. " "Only time will tell if this can happen again," concludes the antivirus company. Read also: The spam goes away and then returns
- Microsoft shuts down spam behemoth Rustock, reduces worldwide spam by 39% (18/03/2011)
- MS claims credit for Rustock botnet takedown (18/03/2011)
- Has the reported disruption of Rustock affected spam levels? (17/03/2011)
- Microsoft kills Rustock botnet - snatches servers for good measure (18/03/2011)
- Microsoft, others help take down Rustock Botnet (18/03/2011)
No comments:
Post a Comment