We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Microsoft posts $250K reward for Rustock botnet herders

First bounty since 2009, when Microsoft offered cash for Conficker's makers

Microsoft upped the ante on Monday in its months-long battle against the Rustock botnet by posting a $250,000 reward for information that leads to the arrest and conviction of the hackers who controlled the malware.

It was the first time Microsoft used its malware bounty program since February 2009, when it offered the same amount for the people responsible for the fast-spreading Conficker worm.

Microsoft announced the reward early Monday in a blog written by Richard Boscovich , a senior attorney with the company's digital crimes unit. Microsoft also posted a reward document (PDF) that included an email address for tipsters.

"We decided to augment our civil discovery efforts to identify those responsible for controlling the notorious Rustock botnet by issuing a monetary reward in the amount of $250,000 for new information that results in the identification, arrest and criminal conviction of such individual(s)," Boscovich wrote.

Microsoft kicked off a take-down of Rustock in March , when its lawyers, including Boscovich, and U.S. Marshals seized the botnet's U.S.-based command-and-control servers.

Since then, the number of Windows PCs infected with the malware has dropped worldwide from 1.6 million to just over 700,000 as of mid-June, Boscovich reported earlier this month.

Although Microsoft published legal notifications in Russian newspapers last month -- a legal formality designed to give potential defendants an opportunity to respond to charges -- it has not identified the "John Does" named in a U.S. federal lawsuit.

In an interview two weeks ago, Boscovich said that Microsoft believes the Rustock operators reside in either St. Petersburg or Moscow.

But Microsoft's hacker bounty program has had mixed results.

Although Microsoft launched the reward program in November 2003 with a $5 million fund, and has offered $250,000 bounties five times in the past, it has paid out only once, in 2005.

Then, two people split a reward for identifying a German teenager as the maker of Sasser.

Sven Jaschan, who was arrested in 2004, confessed to crafting the worm during his trial the following year. Jaschan was eventually sentenced to 21 months of probation.

Before Monday, Microsoft had also posted rewards for the makers of the Blaster, Sobig, MyDoom and Conficker worms. Those rewards have gone unclaimed, however.

Two weeks ago, Boscovich refused to guarantee that Microsoft would be able to name those responsible for Rustock, but liked the company's chances. "I believe there's a strong likelihood [that we'll identify someone], but it's not a guarantee," Boscovich said.

While Boscovich didn't promise that the new reward would lead authorities to the Rustock botnet herders, he said Microsoft wouldn't give up.

"We will continue to follow this case wherever it leads us and remain committed to working with our partners around the world to help people regain control of their Rustock-infected computers," Boscovich said.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is [email protected] .

Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.


IDG UK Sites

Moto G2 (2014) vs Moto E comparison review: New Moto G is worth the extra cash

IDG UK Sites

Is Apple losing confidence in itself?

IDG UK Sites

Oculus Rift 'Crescent Bay' prototype hands-on: it's an amazing experience

IDG UK Sites

How (and where) to buy an iPhone 6 or iPhone 6 Plus in the UK. Plus: What to do if you pre-ordered...