Zeus (malware)
Zeus is a
Detection
Zeus is very difficult to detect even with up-to-date antivirus and other security software as it hides itself using
FBI crackdown
In October 2010 the US
The hackers then used this information to take over the victims’ bank accounts and make unauthorized transfers of thousands of dollars at a time, often routing the funds to other accounts controlled by a network of money mules, paid a commission. Many of the U.S. money mules were recruited from overseas. They created bank accounts using fake documents and false names. Once the money was in the accounts, the mules would either wire it back to their bosses in Eastern Europe, or withdraw it in cash and smuggle it out of the country.[9]
More than 100 people were arrested on charges of conspiracy to commit bank fraud and money laundering, over 90 in the US, and the others in the UK and Ukraine.[10] Members of the ring had stolen $70 million.
In 2013
Possible retirement of creator
In late 2010, a number of Internet security vendors including
See also
- Conficker
- Command and control (malware)
- Gameover ZeuS, the successor to ZeuS
- Jabber Zeus
- Operation Tovar
- Timeline of computer viruses and worms
- Tiny Banker Trojan
- Torpig
- Zombie (computer science)
References
- ^ Abrams, Lawrence. "CryptoLocker Ransomware Information Guide and FAQ". Bleeping Computer. Retrieved 25 October 2013.
- ^ Jim Finkle (17 July 2007). "Hackers steal U.S. government, corporate data from PCs". Reuters. Retrieved 17 November 2009.
- ^ Steve Ragan (29 June 2009). "ZBot data dump discovered with over 74,000 FTP credentials". The Tech Herald. Archived from the original on 25 November 2009. Retrieved 17 November 2009.
- ^ "How to Recognize a Fake Virus Warning". Retrieved 28 July 2016.
- ^ "ZeuS Banking Trojan Report". Dell SecuWorks. 10 March 2010. Retrieved 2 March 2016.
- ^ "The Hunt for the Financial Industry's Most-Wanted Hacker". Bloomberg. Bloomberg Business. 18 June 2015. Retrieved 2 March 2016.
- Symantec. Archived from the originalon 30 January 2010. Retrieved 19 February 2010.
- ^ "Cyber Banking Fraud". The Federal Bureau of Investigation. Retrieved 2 March 2016.
- ^ FBI (1 October 2010). "CYBER BANKING FRAUD Global Partnerships Lead to Major Arrests". Archived from the original on 3 October 2010. Retrieved 2 October 2010.
- ^ BBC (1 October 2010). "More than 100 arrests, as FBI uncovers cyber crime ring". BBC News. Retrieved 2 October 2010.
- ^ Al Jazeera (21 September 2015). "Hamza Bendelladj: Is the Algerian hacker a hero?". AJE News. Retrieved 21 March 2016.
- ^ Zetter, Kim. "Alleged 'SpyEye' Botmaster Ends Up in America, Handcuffs, Kim Zetter, Wired, 3 May 2013". Wired. Wired.com. Retrieved 30 January 2014.
- ^ "Alleged "SpyEye" mastermind extradited to US, Lisa Vaas, 7 May 2013, Sophos nakedsecurity". Nakedsecurity.sophos.com. 7 May 2013. Retrieved 30 January 2014.
- ^ Diane Bartz (29 October 2010). "Top hacker "retires"; experts brace for his return". Reuters. Retrieved 16 December 2010.
- ^ Internet Identity (6 December 2010). "Growth in Social Networking, Mobile and Infrastructure Attacks Threaten Corporate Security in 2011". Yahoo! Finance. Retrieved 16 December 2010.
External links
- "Measuring the in-the-wild effectiveness of Antivirus against Zeus" Study by Internet security firm Trusteer.
- "A summary of the ZeuS Bot" A summary of ZeuS as a Trojan and Botnet, plus vector of attacks.
- "The Kneber BotNet" by Alex Cox Archived 21 April 2022 at the Wayback Machine NetWitness Whitepaper on the Kneber botnet.
- "België legt fraude met onlinebankieren bloot" Dutch news article about a banking trojan
- "Indications in affected systems" Archived 8 January 2018 at the Wayback Machine Files and registry keys created by different versions of Zeus Trojan.
- Zeus, le dieu des virus contre les banques (in French)
- Zeus Bot's User Guide
- Zeus source code at GitHub
- Botnet Bust - SpyEye Malware Mastermind Pleads Guilty, FBI