Massive Botnet Virus Halted Mid-Campaign

By Erin Harrison March 17, 2011

A botnet spam virus said to comprise close to a million infected computers has been disrupted, according to a report issued Thursday by the BBC.

Security researchers said that would make it the largest ever take down of a cyber crime network. It was not clear whether the Rustock botnet was intentionally dismantled. When a botnet is disabled, it can be back up and running in days, according to security experts.

“In 2010, the Rustock botnet – a collection of infected machines – was the most prolific producer of spam on the Internet, at its peak accounting for nearly half of all spam sent globally – some 200 billion messages a day,” the BBC report said. “And new types of malware are proliferating rapidly, making it harder for computer users to ensure their systems are fully protected.”

A report issued this week by Panda Security found that in the first three months of 2011, an average of 73,000 new malware strains were identified, most of which were Trojans. There was a 26 percent increase of new threats compared to the same period last year.

“The proliferation of online tools that enable non-technical people to create Trojans in minutes and quickly set up illegal business – especially when it can provide access to banking details – is responsible for Trojans’ impressive growth,” said Luis Corrons, technical director of PandaLabs.

According to research from Symantec in its annual MessageLabs Intelligence 2010 Security Report, Rustock was responsible for more than 44 billion spam emails per day and had more than one million bots under its control. Botnets Grum and Cutwail are the second and third largest respectively, the report said.

Symantec officials predicted that in 2011 botnet controllers will resort to employing steganography techniques to control their computers. This means hiding their commands in plain view – perhaps within images or music files distributed through file sharing or social networking websites. This approach will allow criminals to surreptitiously issue instructions to their botnets without relying on an ISP to host their infrastructure—thus minimizing the chances of discovery.


Erin Harrison is Executive Editor, Strategic Initiatives, for TMC, where she oversees the company's strategic editorial initiatives, including the launch of several new print and online initiatives. She plays an active role in the print publications and TechZone360, covering IP communications, information technology and other related topics. To read more of Erin's articles, please visit her columnist page.

Edited by Janice McDuffee

Executive Editor, Strategic Initiatives

SHARE THIS ARTICLE
Related Articles

Pai Makes His Case for Title II Repeal

By: Paula Bernier    11/21/2017

FCC Chairman Ajit Pai today made clear his plans to repeal Title II net neutrality rules. The commission is expected to pass his proposal at its Dec. …

Read More

Mist Applies AI to Improve Wi-Fi

By: Paula Bernier    11/9/2017

Mist has created an AI-driven wireless platform that puts the user and his or mobile device at the heart of the wireless network. Combining machine le…

Read More

International Tech Innovation Growing, Says Consumer Technology Association

By: Doug Mohney    11/8/2017

The Consumer Technology Association (CTA) is best known for the world's largest trade event, but the organization's reach is growing far beyond the CE…

Read More

Broadcom Makes Unsolicited $130B Bid for Qualcomm

By: Paula Bernier    11/6/2017

In what could result in the biggest tech deal in history, semiconductor company Broadcom has made an offer to buy Qualcomm for a whopping $130 billion…

Read More

How Google's 'Moonshot' Could Benefit Industrial Markets

By: Kayla Matthews    10/30/2017

The term "moonshot" encapsulates the spirit of technological achievement: an accomplishment so ambitious, so improbable, that it's equivalent to sendi…

Read More