Gameover Zeus Gang Launches New Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


Gameover Zeus Gang Launches New Attacks


Campaign includes rigged emails spoofing major U.S. banks and offering secure email exchange with banking customers



The cybercrime group behind the Gameover Zeus Trojan that steals online banking creds and credit card numbers is waging a massive malicious email campaign that enlists the massive Cutwail spamming botnet to blast its emails.
Millions of emails -- many of which pose as coming from major U.S. banks -- have been spammed out in recent weeks, according to Dell SecureWorks Counter Threat Unit. The phony but convincing-looking emails appeal to a more security-minded banking customer: You have received a new encrypted message or a secure message from [XYZ] Bank, one of the email campaigns says, noting that the bank has set up a secure email exchange for its customers as a way to allay privacy and security concerns.
The message includes an infected attachment that the bank requires for download and registration to the supposed secure email system. Once downloaded, it executes the pony downloader Trojan that installs Gameover and steals online banking credentials, credit card account numbers, and other information.
Another email campaign claims the recipient has received a fax, scan, or voicemail, and includes a free program for retrieving the message -- but, of course, the attachment installs the malware.
The Gameover gang, unlike some cybercrime groups, doesnt lease or sell its malware or services. Its a closed operation that, instead, sometimes contracts resources such as the Cutwail botnet to transport its attacks. More than half of the Top 20 Fortune 500 firms were infected with the Trojan as of this summer, according to SecureWorks, which in July published
a report on Gameover
This particular group has found a combination of malware, tactics, and procedures that leads to success for them. They will continue to follow the same process [of working this way], says Jon Ramsey, CTO of Dell SecureWorks. The malware they use is a private version of theirs, and they dont sell it on the black market. They feel theres more of an upside financially in keeping it private.
Ramsey says the gang has had plenty of success creating large botnets for both sending more malicious spam and conducting distributed denial-of-service attacks. Theyre using a dual-botnet sort of model with Cutwail transporting the spam, and subsequently infected Gameover bots spreading their infections and doing the Gameover botnet operators bidding.
About 678,205 machines were infected with Gameover Zeus in August, according to SecureWorks, and its the biggest botnet targeting financial institutions today. Fourteen of the 20 top Fortune 500 firms are infected, including financial services firms, defense contractors, government agencies, law enforcement, military, and universities.
The peer-to-peer Gameover botnet was structured to deter disruption and to make attribution more difficult. Even so, peer-to-peer botnets are easier to poison by using phony peers that allow researchers to sinkhole traffic, according to Brett Stone-Gross, who has closely studied Gameover.
The P2P ZeuS crew receives considerable support from the products and services offered by the underground community, who collectively fulfill vital functions to plan and execute a large successful cybercriminal operation. Moreover, the large number of compromised personal computers and web servers provide a robust and low cost infrastructure for a variety of malicious activities, Stone-Gross wrote in his report.
[Trade-offs are a fact of life for network defenders, but attackers have to abide them as well. See
The Attackers Trade-Off: Stealth Versus Resilience
.]
Cutwail, one of the worlds largest botnets, to date contains around 500,000 or so bots, according to SecureWorks data.
Researchers at LookingGlass Cyber Solutions say the top 10 countries infected by the Cutwail botnet, in order, are: India, Iran, China, Vietnam, Ukraine, Kazakhstan, Belarus, the U.S., South Korea, and Brazil.
We saw 43,332 unique hosts infected with Cutwail on December 3, 2012, says Jason Lewis, chief scientist with LookingGlass. Overall, the researchers saw some 203,117 bots sending spam -- from botnets including Cutwail, Asprox, Festi, and Kelihos.
About 3,000 hosts had multiple infections, Lewis says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Gameover Zeus Gang Launches New Attacks