Microsoft offers $250K reward to find Rustock masterminds

Share this article:

Fresh off releasing new stats showing that more than half of machines once infected with the Rustock trojan have been cleaned, Microsoft is turning its attention to finding the masterminds responsible for the botnet.

The software giant is offering a $250,000 reward for information that leads to the arrest and conviction of the Rustock operators, Microsoft senior attorney Richard Boscovich announced Monday in a blog post.

The move follows a Microsoft-led takedown operation in March, which involved cutting off command-and-control centers from being able to communicate with Rustock-infected machines and filing a lawsuit against 11 unnamed defendants.

"Microsoft has already been gathering strong evidence in our ongoing investigation, and this reward aims to take that effort a step further," Boscovich wrote. "We will continue to follow this case wherever it leads us and remain committed to working with our partners around the world to help people regain control of their Rustock-infected computers."

According to the "Battling the Rustock Threat" report recently released by Microsoft, as of June 18, more than 700,000 IP addresses are infected with Rustock, down from more than 1.6 million on March 26.

At one point, Rustock was responsible for almost half of the world's spam, according to security firm Symantec.

In February 2009, Microsoft announced a reward of the same price for information that led to the capture of the creators of the then-fast-spreading Conficker worm.

The authors have not been caught.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Skills in demand: Communications and messaging experts

Skills in demand: Communications and messaging experts

The demand for infosec-focused communications and messaging pros is growing.

Company news: New execs at Malwarebytes and an acquisition by VMware

The latest mergers and acquisitions and personnel moves, including Malwarebytes, Abacus Group, VMware, Bay Dynamics, vArmour, Secunia, Norse and more.

Bridging the talent gap in health care

Bridging the talent gap in health care

Cybercriminals are primarily after patient data as it really gets them more money.