Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    business using business intelligence
    How to Use a Competitive Intelligence Dashboard to Turn Market Data Into Smarter Marketing Decisions 
    9 Min Read
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Microsoft Works to Tame the Wild Wild Web
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Microsoft Works to Tame the Wild Wild Web
Security

Microsoft Works to Tame the Wild Wild Web

AlexOlesker
AlexOlesker
4 Min Read
SHARE

The World Wide Web is often compared to the American Old West, such as in the

The World Wide Web is often compared to the American Old West, such as in the recent exchange over NPR and Pastebin between the Federal Bureau of Investigation and the hacker collective Anonymous. When the FBI stated that ”The Internet has become so important to so many people that we have to ensure that the World Wide Web does not become the Wild Wild West,” the Anons answered “when was the Internet not the Wild Wild West?” After all, it’s a massive, poorly governed area full of weak borders, lawless zones, bandits, vigilantes, and struggling lawmen. But, with the recent take down of the Rustock botnet along with continued efforts to remove malware on infected computers and bringing the originators to justice, Microsoft is stepping up to play the sheriff and establish a framework to combat cybercrime.

On Monday, July 18th, Microsoft, in typical Western fashion, offered a $250,000 bounty on information leading to the arrest and conviction of the person or group behind the Rustock botnet, advertised in two Russian newspapers as evidence suggests that the criminals are Russian or Ukrainian. Microsoft only puts out rewards when it believes that it’s likely to turn up evidence leading to an arrest, and wants to use the information to confirm their leads. The information and arrest would also help in efforts to clean the malware off the thousands of infected computers that comprised Rustock and were used to send up to 30 billion spam emails a day.

While Microsoft had previously taken down the botnet Waledac , Rustock was more complex as it relied on hard-coded IP addresses instead of domain names and peer-to-peer command and control servers. To take Rustock offline, Microsoft gathered evidence with the help of the U.S. Marshalls, helping police the web as they did in the West, to to make sure that the bot could not quickly shift to new infrastructire. Then, on March 16th, after rounding up a posse of security researchers from FireEye, computer scientists from the University of Washington, U.S. federal law enforcement, and international law enforcement such as the Dutch High Tech Crime Unit, Microsoft seized Rustock’s command and control servers and successfully severed the IP addresses that controlled it.

More Read

tips to bolster cybersecurity
5 Vital And Helpful Data-Driven Tips To Bolster Cybersecurity
Using Triumfant for Secure Configuration and Change Management
Enhancing Collective Defense with Taxonomies for Operational Cyber Defense
Protecting Privacy: Is a Big Data Marketplace the Answer?
Advantages of Using Microsoft Azure for Data Preservation and Security

Still, some of the threat remains. The thousands of computers controlled by Rustock remain riddled with malware, and Microsoft is now working with Computer Emergency Readiness Teams and Internet Service Providers worldwide to help clean infected computers. There was also evidence that the originators of Rustock are working to rebuild their networks by sending out more malware, which is part of the reason Microsoft put out the reward for information that can stop them. Most importantly, however, through the criminal case against the anonymous originators of the botnet, the security research that exposed Rustock’s command and control servers, and the model of cooperation in the take down, Microsoft hopes to build a framework against cybercrime to help make the web less wild.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

business using business intelligence
How to Use a Competitive Intelligence Dashboard to Turn Market Data Into Smarter Marketing Decisions 
Analytics Big Data Exclusive Marketing
fda14abd c869 4da5 943c c036ad8efc2e
How Data-Driven Journalists Are Using API News Apps to Improve Reporting
Big Data Exclusive News
0622cae5 f7d7 4f74 84b5 eabd1a823dca
How Data-Driven Grocery Recommendations Help Shoppers Eat Better With Less Effort
Big Data Exclusive
business recovering from data loss
How Data-Driven Businesses Protect MySQL Databases from Shutdown
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Virtual Private Servers
Big DataSecurity

Big Data Leads to Better Virtual Private Servers for Small Businesses

5 Min Read
ITSecurity

How to Properly Protect Data on a Crypto Exchange

5 Min Read
mobile technology
Big DataBusiness IntelligenceData ManagementHardwareInside CompaniesITLocationMobilityNew ProductsPrivacySecuritySocial Data

Indoor Locationing: The Hottest Thing in Tech

2 Min Read
Data Science Career Options
Analytics

Data Analytics Help Safeguard Businesses From Online Scams

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?