Trend Micro Nukes Zeus Botnet Server

  /     /     /  
Publicated : 22/11/2024   Category : security


Trend Micro Nukes Zeus Botnet Server


PayPal, eBay, and the customers of at least 15 banks were targeted by the eliminated botnet.



(click image for larger view)
Slideshow: How Firesheep Can Hijack Web Sessions
Antivirus security company Trend Micro on Wednesday said that it eliminated -- or sinkholed -- a Zeus botnet command-and-control (C&C) server.
In February 2011, we successfully collaborated with CDMON, a registrar, to gain control of a Zeus botnet C&C server, thereby rendering it ineffective, said Trend Micro security researchers David Sancho and Rainer Link in a
blog post
.
According to a
report
(pdf) released by Trend Micro that detailed the takedown in greater detail, this particular Zeus botnet
targeted customers
of 15 banks in the United States, South America, and Europe, as well as multiple online payment providers, including eBay and PayPal.
The lack of coherence regarding the targeted banks and the locations of the infected computers suggests that the botmaster just left a default configuration while spreading the Trojan around his own geographical area, according to the report. This was a sign that he was still an amateur.
Zeus is a
crimeware toolkit
thats used to build botnets and steal sensitive financial information from peoples PCs. There are multiple Zeus botnets in the wild, each of which reports back to the botmaster that created it.
Indeed, according to the
Zeus Tracker
, which is monitoring more than 500 Zeus C&C servers, there are at least 44 Zeus C&C servers running in Russia, 35 in the United States, 29 in Romania, and 28 in the Ukraine. As that suggests, even though Zeus also appears to have
merged with SpyEye
, a former competitor, people are still using the standalone Zeus malware toolkit.
The botnet sinkholed by Trend Micro appeared to have originated in the Americas. We found that over 95% of the inbound requests to the C&C server came from South America, particularly from Mexico, said the Trend Micro researchers. This indicates that the bot may have originated from Latin America or was created using the Spanish language. Its creator may have decided to target banks in Mexico and Chile as well, as these often still used single-factor authentication to secure their customers accounts.
For the takedown, domain registrar CDMON -- through which the botmaster had registered the sites for his Zeus-driven attacks -- helped Trend Micro impersonate the real C&C server. CDMON was kind enough to replace the servers original address with that of our own machine, according to the Trend Micro report. This was enough to tell the bot clients that they should communicate with us instead of the cybercriminal. The security company said it collected three weeks worth of data for analysis before deactivating the botnet.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Trend Micro Nukes Zeus Botnet Server