Microsoft chops Rustock botnet in half
Rustock is half the size it was in March thanks to the Microsoft led Operation b107.


The Rustock botnet is now less than half the size it was in March, thanks to the Microsoft led takedown in that month.
The giant spamming botnet was dealt a serious blow when Operation b107 severed the connection between Rustock's command and control structure and hundreds of thousands of computers operating under its control.
The number of systems powering the Rustock botnet was reduced from 1,601,619 to 702,860 between March and June, according to known IP address infections recorded by Microsoft.
This represented a 56.12 per cent reduction. In India, where Rustock infections were most prominent, the reduction was as high as 69.3 per cent.
"That's great news and the infection reduction has happened much more quickly than it did for Waledac over a similar period of time last year, but we still have a long way to go," said Richard Boscovich, senior attorney for the Microsoft Digital Crimes Unit, in a blog post.
Boscovich called for greater collaboration within the cyber security industry to help take down the bad guys.
"The good news is that we are making progress. The tech industry, policy makers and consumer advocacy groups have helped curb cyber threats through the development of safer products and by increasing public awareness of cyber crime," Boscovich added.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"As we continue our efforts to fight cyber crime, one thing is clear: these threats cannot be tackled alone. It was through the combined effort of Microsoft, the judicial system and the industry that Rustock was successfully taken down."
The International Cyber Security Protection Alliance (ICSPA) was launched yesterday, hoping to facilitate a more collaborative approach, linking up Governments with industry and businesses.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott
-
Horabot campaign targeted businesses for more than two years before finally being discovered
News The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
By Ross Kelly
-
Brand-new Emotet campaign socially engineers its way from detection
News This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
By Ross Kelly
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomware
News The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
By Connor Jones
-
Beating the bad bots: Six ways to identify and block spam traffic
In-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
By Sead Fadilpašić
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia
News The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
By Connor Jones
-
Microsoft's secure VBA macro rules already being bypassed by hackers
News Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
By Connor Jones
-
Emotet infrastructure has almost doubled since resurgence was confirmed
News Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation
By Connor Jones