Microsoft: Rustock takedown proves botnets can be crippled

More than half of the PCs once infected with the spamming malware are now clean

Microsoft said Tuesday that the coordinated takedown of the Rustock botnet and follow-up efforts had purged the malware from more than half of the PCs once controlled by Russian hackers.

"This shows that disruptive action [against botnets] is viable and possible," said Richard Boscovich, a senior attorney with Microsoft's Digital Crime Unit.

[ Master your security with InfoWorld's interactive Security iGuide. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]

"Once you start taking apart the infrastructure of botnets, you drive up the cost of [botnet gangs] doing business," Boscovich added in an interview Monday. "Disruptive action is just as good as trying to arrest someone."

Since March, when Microsoft lawyers and U.S. Marshals seized Rustock command-and-control (C&C) servers at five Web hosting providers in seven U.S. cities, the number of Windows PCs infected with the malware has dropped worldwide from 1.6 million to just over 700,000 as of June 18, Boscovich reported in a blog post today.

Microsoft also released a detailed report on Rustock, the take-down effort it led, and the impact of its anti-botnet campaign (download PDF).

In the U.S., an estimated 86,000 Rustock-infected PCs in March had been reduced to some 53,000 by June, a drop of 38 percent. Other countries saw even bigger reductions: In India, the March tally of 322,000 infected machines plummeted by 69 percent to approximately 99,000 in June.

The takedown itself didn't remove the Windows PCs from Rustock control. Instead, the seizure of the U.S.-based C&C servers and Microsoft's work to snatch control of the domains that Rustock was coded to use for fallback communications prevented the botnet from updating itself.

That in turn provided the breathing room antivirus vendors needed to issue signatures for the existing Rustock malware and users the opportunity to scrub their systems with security software.

Microsoft, for instance, has provided Rustock signatures for its Malicious Software Removal Tool (MSRT), a free utility that detects and deletes malware, since 2008.

The take-down of Rustock's communications channels effectively silenced the botnet.

Since March, the botnet -- which was once one of the largest purveyors of spam, particularly pitches for fake drugs -- has been quiet. "Botnet activity dropped abruptly to almost zero in mid-March following the take-down," Microsoft said in its report.

Prior to the take-down, Rustock was capable of sending as many as 30 million spam messages daily.

"Cleaning the users' PCs is an important part, but really this shows that a technical countermeasure along with a legal countermeasure works," said Boscovich, talking about the two-pronged approach of seizing servers and shutting down Rustock's backup communications.

And the impact goes beyond Rustock.

"The minute you take down Rustock, what does that do to those who want to send spam?" Boscovich asked. "They have to find other botnets. But if you're a botnet herder, and you just saw Rustock go down -- with years of work coding and planting malware and maintaining the botnet -- you're going to charge more. And that's an impact on spammers' cost analysis, as it becomes more and more expensive to send out spam."

Statistics from Symantec seemed to prove Microsoft was on to something.

In its June report on spam and malware trends, Symantec said that spam levels had not recovered from the Rustock take-down, and in June accounted for 72.9 percent of all email, down from 83.1 percent in March.

Alex Lanstein, a senior engineer with FireEye who worked with Microsoft on the Rustock takedown, said the numbers spoke for themselves. "The spam drop is a direct result of the take-down," Lanstein said Monday.

But Symantec also said there was evidence that another botnet, dubbed "Grum," had stepped in to partially replace Rustock. The security firm cited such factors as similar subject lines, sending domains, a change in character sets by Grum just hours after the Rustock takedown and similarities in the two botnets' distribution patterns (download PDF).

So are botnet takedowns just a game of Whack-a-Mole, where bashing one botnet only sees it replaced by another?

"I think that's foolish to say," Boscovich said. "If you don't take action, what do you do, sit and watch it happen? This weeds out the smaller players, who decide that they can't afford the higher costs of sending spam. If everyone started doing more proactive work like [takedowns], we really would be able to take down a lot of players, and disrupt the entire spam ecosystem."

"It's not nitpicking, but there are always a lot of naysayers who play up the negative angle," added Lanstein. "The lasting impact comes from how much you follow through."

And in his eyes, Microsoft is committed to the battle long term. "[Microsoft] is bringing the fight to the bad guys," said Lanstein. "This is definitely not the last botnet we're going to go after."

Microsoft has not yet identified the presumed head of the Rustock botnet gang, but last week a federal judge granted its request to extend its effort to notify unnamed defendants in the lawsuit, a legal formality designed to give potential defendants an opportunity to respond to charges.

Microsoft believes the Rustock operator resides in either St. Petersburg or Moscow in the Russian Federation; last month it published legal notifications in those cities' newspapers.

Although Boscovich said it was unlikely the defendants would step forward, he sounded confident that, with the information on the seized servers and other investigations, someone would be held accountable for Rustock.

"We think we can do some more to identify the individuals to zone in on the actual defendants in this case," Boscovich said. "I believe there's a strong likelihood [that we'll identify someone], but it's not a guarantee."

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers, and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed. His email address is gkeizer@computerworld.com. Read more about security in Computerworld's Security Topic Center.

This story, "Microsoft: Rustock takedown proves botnets can be crippled" was originally published by Computerworld.

Related:

Copyright © 2011 IDG Communications, Inc.

How to choose a low-code development platform