|
|
Battling the Rustock Threat |
This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.
This document provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans. The document examines the background of Win32/Rustock, its functionality, how it works, and provides threat telemetry data and analysis from calendar year 2010 through May 2011. In addition, this document details the legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products.
Files
|
|
Status: DeletedThis download is no longer available on microsoft.com. The downloads below are archives provided by the Internet Archive Wayback Machine from the Microsoft Download Center prior to April 2023. |
| Files |
|---|
|
|
|
|
This download includes .xps files. XPS was a Microsoft document format intended to replace PDF. To view these files, you may need to install the XPS Essentials Pack.
System Requirements
Operating Systems: Windows 2000, Windows Server 2003, Windows Vista, Windows Server 2008, Windows XP, Windows 7
Any supported Operating System
Installation Instructions
Download Battling the Rustock Threat. Available as a PDF or an XPS. In order to view the XPS document, you will need to install the reader (included in Windows 7 and Windows Vista).