Massive Botnet Virus Halted Mid-Campaign

By

A botnet spam virus said to comprise close to a million infected computers has been disrupted, according to a report issued Thursday by the BBC.

Security researchers said that would make it the largest ever take down of a cyber crime network. It was not clear whether the Rustock botnet was intentionally dismantled. When a botnet is disabled, it can be back up and running in days, according to security experts.

“In 2010, the Rustock botnet – a collection of infected machines – was the most prolific producer of spam on the Internet, at its peak accounting for nearly half of all spam sent globally – some 200 billion messages a day,” the BBC report said. “And new types of malware are proliferating rapidly, making it harder for computer users to ensure their systems are fully protected.”

A report issued this week by Panda Security found that in the first three months of 2011, an average of 73,000 new malware strains were identified, most of which were Trojans. There was a 26 percent increase of new threats compared to the same period last year.

“The proliferation of online tools that enable non-technical people to create Trojans in minutes and quickly set up illegal business – especially when it can provide access to banking details – is responsible for Trojans’ impressive growth,” said Luis Corrons, technical director of PandaLabs.

According to research from Symantec in its annual MessageLabs Intelligence 2010 Security Report, Rustock was responsible for more than 44 billion spam emails per day and had more than one million bots under its control. Botnets Grum and Cutwail are the second and third largest respectively, the report said.

Symantec officials predicted that in 2011 botnet controllers will resort to employing steganography techniques to control their computers. This means hiding their commands in plain view – perhaps within images or music files distributed through file sharing or social networking websites. This approach will allow criminals to surreptitiously issue instructions to their botnets without relying on an ISP to host their infrastructure—thus minimizing the chances of discovery.


Erin Harrison is Executive Editor, Strategic Initiatives, for TMC, where she oversees the company's strategic editorial initiatives, including the launch of several new print and online initiatives. She plays an active role in the print publications and TechZone360, covering IP communications, information technology and other related topics. To read more of Erin's articles, please visit her columnist page.

Edited by Janice McDuffee
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Executive Editor, Strategic Initiatives

SHARE THIS ARTICLE
Related Articles

Can Science Outsmart Deepfake Deceivers? Klick Labs Proposes an Emerging Solution

By: Alex Passett    3/25/2024

Researchers at Klick Labs were able to identify audio deepfakes from authentic audio recordings via new vocal biomarker technology (alongside AI model…

Read More

Top 5 Best Ways to Integrate Technology for Successful Project-Based Learning

By: Contributing Writer    3/19/2024

Project-based learning, also popularly known as the PBL curriculum, emphasizes using and integrating technology with classroom teaching. This approach…

Read More

How to Protect Your Website From LDAP Injection Attacks

By: Contributing Writer    3/12/2024

Prevent LDAP injection attacks with regular testing, limiting access privileges, sanitizing user input, and applying the proper encoding functions.

Read More

Azure Cost Optimization: 5 Things You Can Do to Save on Azure

By: Contributing Writer    3/7/2024

Azure cost optimization is the process of managing and reducing the overall cost of using Azure. It involves understanding the resources you're using,…

Read More

Massive Meta Apps and Services Outage Impacts Users Worldwide

By: Alex Passett    3/5/2024

Meta's suite of apps and services are experiencing major global outages on Super Tuesday 2024.

Read More