This is the Trace Id: 4f64f17879da347599edbf84d9a03c07

Battling the Rustock Threat

This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.

Important! Selecting a language below will dynamically change the complete page content to that language.

  • Version:

    1.0

    Date Published:

    13/06/2024

    File Name:

    Battling the Rustock Threat_English.pdf

    Battling the Rustock Threat_English.xps

    File Size:

    1021.2 KB

    1.2 MB

    This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans. The document examines the background of Win32/Rustock, its functionality, how it works, and provides threat telemetry data and analysis from calendar year 2010 through May 2011. In addition, this document details the legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products.
  • Supported Operating Systems

    Windows 2000, Windows 7, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

    Any supported Operating System
  • Download Battling the Rustock Threat. Available as a PDF or an XPS. In order to view the XPS document, you will need to install the reader (included in Windows 7 and Windows Vista).