Microsoft Security Intelligence Report

Thursday, July 7, 2011 @ 03:07 PM gHale

This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.

The document examines the background of Win32/Rustock, its functionality, how it works, and provides threat telemetry data and analysis from calendar year 2010 through May 2011. In addition, this document details the legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products.

Click here to down the Microsoft paper.

Leave a Reply

You must be logged in to post a comment.