Researchers see updated Zeus malware
A combination of the Zeus and SpyEye banking malware programs is taking shape, researchers say
IDG News Service - A dangerous piece of malicious code responsible for stealing money from online bank accounts is being updated with new functions after its source code was leaked earlier this year, according to security researchers.
The Zeus malware has been a significant issue for banks. It is capable of intercepting login credentials in real-time on an infected computer and carrying out immediate transactions. Zeus is also frequently undetected by antivirus software.
Zeus is still used by cybercriminals, but it is believed active development on it has stopped. Its source code was leaked in March, and security researchers noticed that many of its functions were incorporated into a similar type of malware called SpyEye, a merger that has incrementally continued over the last few months.
The improvements are relatively minor at this point, such as tweaks to ensure that SpyEye evades security software programs, said Aviv Raff, CTO and cofounder of Seculert.
Another small improvement is that SpyEye's developers have made it harder for security researchers to track its command-and-control servers hosting the malware's configuration files. Servers hosting those configuration files -- which send instructions to computers infected with SpyEye -- could be tracked and monitored, but that has become more difficult with the version of SpyEye studied by Raff.
"They hide the configuration file of the malware behind a script which requires a specific key to download," Raff said in an interview over instant messenger. "The current tracker will need to know the key which the malware uses in order to download and analyze the malware configuration file."
There are many botnets that use the Zeus and SpyEye code. This latest one with the improvements is dubbed "Ice IX." The code needed to run the botnet is selling for around US$1,800, a competitive price, wrote Jorge Mieres, a malware analyst with Kaspersky Lab. SpyEye has been sold for as much as $10,000 in the past.
"It is clear that from now on, more new crimeware will be based on Zeus code," Mieres wrote on a Kaspersky blog. "New developers, hoping to profit from cybercrime, will attempt to create their own new alternatives based on this source."
Raff concurs with the prediction. "Unfortunately, I believe that we will see other cybercriminals take the source code of Zeus and add more harmful features," he said.
Earlier this month, a French security researcher who goes by the name Xylitol found a way to defeat a mechanism that prevented people who had not paid for SpyEye from using it. SpyEye uses VMProtect to lock an installation of the software program to a particular physical device, wrote Sean Bodmer, senior threat intelligence analyst, with the security company Damballa.
Xylitol's work helps security researchers since it opens up more information on how SpyEye is coded, which may help when developing defenses against it. Bodmer wrote.
Send news tips and comments to firstname.lastname@example.org
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts