By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData Collective
  • Analytics
    AnalyticsShow More
    data-driven image seo
    Data Analytics Helps Marketers Substantially Boost Image SEO
    8 Min Read
    construction analytics
    5 Benefits of Analytics to Manage Commercial Construction
    5 Min Read
    benefits of data analytics for financial industry
    Fascinating Changes Data Analytics Brings to Finance
    7 Min Read
    analyzing big data for its quality and value
    Use this Strategic Approach to Maximize Your Data’s Value
    6 Min Read
    data-driven seo for product pages
    6 Tips for Using Data Analytics for Product Page SEO
    11 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Microsoft Works to Tame the Wild Wild Web
Share
Notification Show More
Latest News
anti-spoofing tips
Anti-Spoofing is Crucial for Data-Driven Businesses
Security
ai in software development
3 AI-Based Strategies to Develop Software in Uncertain Times
Software
ai in ppc advertising
5 Proven Tips for Utilizing AI with PPC Advertising in 2023
Artificial Intelligence
data-driven image seo
Data Analytics Helps Marketers Substantially Boost Image SEO
Analytics
ai in web design
5 Ways AI Technology Has Disrupted Website Development
Artificial Intelligence
Aa
SmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Microsoft Works to Tame the Wild Wild Web
Security

Microsoft Works to Tame the Wild Wild Web

AlexOlesker
Last updated: 2011/08/16 at 9:04 AM
AlexOlesker
4 Min Read
SHARE
- Advertisement -

The World Wide Web is often compared to the American Old West, such as in the

The World Wide Web is often compared to the American Old West, such as in the recent exchange over NPR and Pastebin between the Federal Bureau of Investigation and the hacker collective Anonymous. When the FBI stated that ”The Internet has become so important to so many people that we have to ensure that the World Wide Web does not become the Wild Wild West,” the Anons answered “when was the Internet not the Wild Wild West?” After all, it’s a massive, poorly governed area full of weak borders, lawless zones, bandits, vigilantes, and struggling lawmen. But, with the recent take down of the Rustock botnet along with continued efforts to remove malware on infected computers and bringing the originators to justice, Microsoft is stepping up to play the sheriff and establish a framework to combat cybercrime.

On Monday, July 18th, Microsoft, in typical Western fashion, offered a $250,000 bounty on information leading to the arrest and conviction of the person or group behind the Rustock botnet, advertised in two Russian newspapers as evidence suggests that the criminals are Russian or Ukrainian. Microsoft only puts out rewards when it believes that it’s likely to turn up evidence leading to an arrest, and wants to use the information to confirm their leads. The information and arrest would also help in efforts to clean the malware off the thousands of infected computers that comprised Rustock and were used to send up to 30 billion spam emails a day.

While Microsoft had previously taken down the botnet Waledac , Rustock was more complex as it relied on hard-coded IP addresses instead of domain names and peer-to-peer command and control servers. To take Rustock offline, Microsoft gathered evidence with the help of the U.S. Marshalls, helping police the web as they did in the West, to to make sure that the bot could not quickly shift to new infrastructire. Then, on March 16th, after rounding up a posse of security researchers from FireEye, computer scientists from the University of Washington, U.S. federal law enforcement, and international law enforcement such as the Dutch High Tech Crime Unit, Microsoft seized Rustock’s command and control servers and successfully severed the IP addresses that controlled it.

More Read

anti-spoofing tips

Anti-Spoofing is Crucial for Data-Driven Businesses

Fortifying Enterprise Digital Security Against Hackers Weaponizing AI
How to Plan a Cybersecurity Strategy for Your Small Business
How Vulnerable Are Supply Chains to Hacking?
How IEC 62443 and Other Regulatory Requirements Help Enable IoT Security

Still, some of the threat remains. The thousands of computers controlled by Rustock remain riddled with malware, and Microsoft is now working with Computer Emergency Readiness Teams and Internet Service Providers worldwide to help clean infected computers. There was also evidence that the originators of Rustock are working to rebuild their networks by sending out more malware, which is part of the reason Microsoft put out the reward for information that can stop them. Most importantly, however, through the criminal case against the anonymous originators of the botnet, the security research that exposed Rustock’s command and control servers, and the model of cooperation in the take down, Microsoft hopes to build a framework against cybercrime to help make the web less wild.

AlexOlesker August 16, 2011
Share this Article
Facebook Twitter Pinterest LinkedIn
Share
- Advertisement -

Follow us on Facebook

Latest News

anti-spoofing tips
Anti-Spoofing is Crucial for Data-Driven Businesses
Security
ai in software development
3 AI-Based Strategies to Develop Software in Uncertain Times
Software
ai in ppc advertising
5 Proven Tips for Utilizing AI with PPC Advertising in 2023
Artificial Intelligence
data-driven image seo
Data Analytics Helps Marketers Substantially Boost Image SEO
Analytics

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

anti-spoofing tips
Security

Anti-Spoofing is Crucial for Data-Driven Businesses

6 Min Read
Digital Security From Weaponized AI
Security

Fortifying Enterprise Digital Security Against Hackers Weaponizing AI

11 Min Read
Cybersecurity Plan
Security

How to Plan a Cybersecurity Strategy for Your Small Business

8 Min Read
Security

How Vulnerable Are Supply Chains to Hacking?

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US

© 2008-23 SmartData Collective. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?