This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.bbc.co.uk/go/rss/int/news/-/news/technology-12772319

The article has changed 4 times. There is an RSS feed of changes available.

Version 0 Version 1
Major spam network silenced mid-campaign Microsoft aids shutdown of Rustock spam net
(1 day later)
The sudden drop in activity of a major spam producer looks to be the result of the largest co-ordinated attack on spammers. The sudden drop in activity of a major spam producer was the result of a larges co-ordinated attack on spammers, it has emerged.
At 15:30 GMT on 16 March, a network of spam-producing computers, known as Rustock, suddenly stopped.At 15:30 GMT on 16 March, a network of spam-producing computers, known as Rustock, suddenly stopped.
It also appears that the infrastructure needed to control the spam network has been disrupted. Raids on the network's infrastructure were trigged by a long-running investigation by Microsoft.
Security researchers said that would make it the largest ever take down of a cyber crime network. During raids, servers that acted as Rustock's command and control systems were seized.
In 2010, the Rustock botnet - a collection of infected machines - was the most prolific producer of spam on the internet, at its peak accounting for nearly half of all spam sent globally - some 200 billion messages a day.In 2010, the Rustock botnet - a collection of infected machines - was the most prolific producer of spam on the internet, at its peak accounting for nearly half of all spam sent globally - some 200 billion messages a day.
Prolific spammerProlific spammer
The volume of spam coming out of Rustock has fluctuated wildly recently, so sudden drops in activity are not uncommon. Initially it was not clear that the network had been tackled by law enforcement because the volume of spam coming out of Rustock has fluctuated wildly recently.
But usually, the spikes in activity last for 12 to 16 hours, Vincent Hanna of anti-spam group Spamhaus told BBC News. Usually the spikes in activity last for 12 to 16 hours, Vincent Hanna of anti-spam group Spamhaus told BBC News.
"When Rustock stopped yesterday it was in mid-campaign," he said."When Rustock stopped yesterday it was in mid-campaign," he said.
Furthermore, the botnet seems to be unable to communicate with its command and control infrastructure, he said. href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2011/03/18/taking-down-botnets-microsoft-and-the-rustock-botnet.aspx" >Writing on Microsoft's public policy blog Richard Boscovich, a senior attorney in the company's Digital Crimes Unit, said the raids effectively severed the link between the million or so drone computers in Rustock and the servers that control them.
Computers within botnets are controlled by other machines which send out instructions of when to instigate spam campaigns or other attacks. Mr Boscovich said Rustock was a tough nut to crack because of the way it was organised. The swift seizure of servers should have denied Rustock's controllers any chance of simply shifting it to fresh machines, he said.
But disrupting the command and control infrastructure is a Herculean task. The hard drives gathered in the raid would be be analysed so investigators can learn more about the way it ran and who was behind it.
It said it would also work with ISPs to identify and clean up PCs that were unwitting participants in the Rustock botnet.
Take down
Disrupting the command and control infrastructure of a botnet is a Herculean task.
It requires the co-ordination of security groups with insight in to how the botnet operates, the participation of law-enforcement agencies, domain name registrars and internet service providers that can potentially be located in different time zones, said Paul Wood, a security researcher at Symantec.cloud.It requires the co-ordination of security groups with insight in to how the botnet operates, the participation of law-enforcement agencies, domain name registrars and internet service providers that can potentially be located in different time zones, said Paul Wood, a security researcher at Symantec.cloud.
Other botnets have been taken down before, but none the size of Rustock, which is thought to comprise close to a million infected computers.
Temporary relief?
But no-one has yet confirmed that silencing Rustock was the result of co-ordinated activity, Mr Wood said.
"One of the problems for law enforcers is deciding when to take action," he said."One of the problems for law enforcers is deciding when to take action," he said.
Once police know enough about a botnet to be able to take it down, they can collect an awful lot of intelligence about its owners, he added.Once police know enough about a botnet to be able to take it down, they can collect an awful lot of intelligence about its owners, he added.
Previous attempts to take down botnets have enjoyed mixed success.Previous attempts to take down botnets have enjoyed mixed success.
When security firm FireEye disabled the Mega-D botnet's command and control infrastructure in early November 2009, its owners were able to resume their activities within a month.When security firm FireEye disabled the Mega-D botnet's command and control infrastructure in early November 2009, its owners were able to resume their activities within a month.
"Many of these botnets are run as businesses, so they have back-up plans in place," said Mr Wood."Many of these botnets are run as businesses, so they have back-up plans in place," said Mr Wood.
Persistent menacePersistent menace
Often the infected computers that form a botnet are programmed to seek out websites where they can download new instructions, in the event that the command and control systems are breached.Often the infected computers that form a botnet are programmed to seek out websites where they can download new instructions, in the event that the command and control systems are breached.
"The botnet controllers can use legitimate websites - such as headlines from news sites - to identify where the new instructions can be found," said Mr Wood."The botnet controllers can use legitimate websites - such as headlines from news sites - to identify where the new instructions can be found," said Mr Wood.
So even when a botnet is disabled, it may be back up and running in days. Despite the success, the spread of botnets looks set to continue, as cyber crooks grow increasingly sophisticated in their ability to infect machines.
"Only time will tell if we will see [Rustock] coming back," said Mr Hanna.
Nevertheless, the spread of botnets looks set to continue, as the cyber crooks grow increasingly sophisticated in their ability to infect machines.
"The malware used embeds itself deep in the operating system, making it difficult to identify," said Mr Wood."The malware used embeds itself deep in the operating system, making it difficult to identify," said Mr Wood.
And new types of malware are proliferating rapidly, making it harder for computer users to ensure their systems are fully protected.
There were 26% more incidences of new types of malware in the first three months of 2011 than in the final three months of 2010, according to anti-virus firm Panda Security.
A large number of botnets are devoted to stealing online banking credentials or launching denial of service attacks, said Luis Corrons Granel, technical director of PandaLabs, the research arm of Panda Security.