Microsoft Offers $250K Bounty for Spambot Gang
Microsoft is offering a $250,000 reward for information regarding the owners of the Rustock spam botnet, despite the fact the it has already been neutralized.
Rustock at one point infected an estimated one million computers. Those behind it used the network to send as many as 30 million spam messages a day, most commonly selling counterfeit drugs. (Source: latimes.com)
Although the botnet has been brought under control, there's still a threat because its creators remain at large. As a result, Microsoft has issued a bounty.
The reward is $250,000 and will be paid to anyone who provides "new information that results in the identification, arrest and criminal conviction of whoever is responsible for the control of the Rustock bot-net." Information can be e-mailed to avreward[at]microsoft.com and the reward is open to anyone in the world, subject to the prevailing laws in their country. (Source: technet.com)
Bounty Relates to Both Criminal, Civil Cases
The aim of the bounty is not just to bring the offenders to justice in criminal courts, but also to get the names of those responsible added to civil action taken by Microsoft.
At the moment that action, which made a takedown of Rustock possible, is a "John Doe" case, meaning the names of the defendants can't be identified. Because it was not possible to serve notice on the defendants personally, Microsoft was forced to issue notice of the lawsuit through advertisements in newspapers in Russia, the country that appears most likely to be the current location of those responsible.
A senior Microsoft attorney, Richard Boscovich, said "While the primary goal for our legal and technical operation has been to stop and disrupt the threat that Rustock has posed for everyone affected by it, we also believe the Rustock bot-herders should be held accountable for their actions."
The response to Rustock was one of several examples of a new tactic by legal authorities. It was based on the fact that infected computers in a botnet must contact servers regularly to receive instructions.
Botnet Bosses Make Russian Getaway
In 2008, two Internet providers closed down access to a Californian client, McColo, which offered web hosting.
It turned out this customer base included the command and control servers for many leading botnets, of which Rustock appeared to be the largest. The closure led to a temporary reduction in worldwide spam of around 75 per cent, only for Rustock to regain much of its original strength. Analysis of Internet traffic suggested it was likely the operators had switched to servers in Russia.
Law enforcement officials later successfully applied for court permission to take control of servers known to be part of the network. They then carried out a co-ordinated international takedown in March. That put a temporary halt to the instruction transmissions and allowed time to begin a campaign to identify infected machines and help victims remove the virus before the perpetrators were able to establish new lines of communications.
Microsoft says it's already cut the number of infected machines by half.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.