Massive Botnet Virus Halted Mid-Campaign

By Erin Harrison March 17, 2011

A botnet spam virus said to comprise close to a million infected computers has been disrupted, according to a report issued Thursday by the BBC.

Security researchers said that would make it the largest ever take down of a cyber crime network. It was not clear whether the Rustock botnet was intentionally dismantled. When a botnet is disabled, it can be back up and running in days, according to security experts.

“In 2010, the Rustock botnet – a collection of infected machines – was the most prolific producer of spam on the Internet, at its peak accounting for nearly half of all spam sent globally – some 200 billion messages a day,” the BBC report said. “And new types of malware are proliferating rapidly, making it harder for computer users to ensure their systems are fully protected.”

A report issued this week by Panda Security found that in the first three months of 2011, an average of 73,000 new malware strains were identified, most of which were Trojans. There was a 26 percent increase of new threats compared to the same period last year.

“The proliferation of online tools that enable non-technical people to create Trojans in minutes and quickly set up illegal business – especially when it can provide access to banking details – is responsible for Trojans’ impressive growth,” said Luis Corrons, technical director of PandaLabs.

According to research from Symantec in its annual MessageLabs Intelligence 2010 Security Report, Rustock was responsible for more than 44 billion spam emails per day and had more than one million bots under its control. Botnets Grum and Cutwail are the second and third largest respectively, the report said.

Symantec officials predicted that in 2011 botnet controllers will resort to employing steganography techniques to control their computers. This means hiding their commands in plain view – perhaps within images or music files distributed through file sharing or social networking websites. This approach will allow criminals to surreptitiously issue instructions to their botnets without relying on an ISP to host their infrastructure—thus minimizing the chances of discovery.


Erin Harrison is Executive Editor, Strategic Initiatives, for TMC, where she oversees the company's strategic editorial initiatives, including the launch of several new print and online initiatives. She plays an active role in the print publications and TechZone360, covering IP communications, information technology and other related topics. To read more of Erin's articles, please visit her columnist page.

Edited by Janice McDuffee

Executive Editor, Strategic Initiatives

SHARE THIS ARTICLE
Related Articles

Compliance: Hope Is Not a Plan

By: Special Guest    8/1/2018

Internal misalignment between compliance and business teams can lead to major problems for organizations seeking to implement new digital communicatio…

Read More

Modern Moms Shaping Influence

By: Maurice Nagle    7/19/2018

Everyone knows Mom knows best. The internet is enabling a new era in sharing, and sparking a more enlightened, communal shopping experience. Mommy blo…

Read More

Why People Don't Update Their Computers

By: Special Guest    7/13/2018

When the WannaCry ransomware attacked companies all over the world in 2017, experts soon realized it was meant to be stopped by regular updating. Even…

Read More

More Intelligence About The New Intelligence

By: Rich Tehrani    7/9/2018

TMC recently announced the launch of three new artificial intelligence events under the banner of The New Intelligence. I recently spoke with TMC's Ex…

Read More

Technology, Innovation, and Compliance: How Businesses Approach the Digital Age

By: Special Guest    6/29/2018

Organizations must align internally to achieve effective innovation. Companies should consider creating cross-functional teams or, at a minimum, incre…

Read More