Contact
QR code for the current URL

Press release Box-ID: 363892

Trusteer 142 Wooster St. 10012 New York, United States http://www.trusteer.com
Contact Mr Marc Gendron +1 781-237-0341
Company logo of Trusteer
Trusteer

Trusteer uncovers Zeus botnet that plunders over 100,000 UK Internet user credentials

(PresseBox) (London, )
Trusteer, the leading provider of secure browsing services, today announced that it has uncovered a large Zeus version 2 botnet being used to conduct financial fraud in the UK which is operated and controlled from Eastern Europe. The botnet appears to be controlling more than 100,000 infected computers, 98% of which are UK Internet users. The criminals have been harvesting all manner of potentially lucrative and revenueproducing credentials - including online account IDs plus login information to banks, credit and debit card numbers, account types plus balances, bank statements, browser cookies, client side certificates, login information for email accounts and social networks and even FTP passwords. Trusteer discovered the extent of the botnet after they gained access to the botnet's drop servers and command and control center which contained the stolen information including hundreds of thousands of stolen credentials. Trusteer are sharing the information with UK law enforcement agencies.

"This is just one out of many Zeus 2 botnets operating all over the world," says Amit Klein, Trusteer's chief technology officer. "What is especially worrying is that this botnet doesn't just stop at user IDs and passwords. By harvesting client side certificates and cookies, the cybercriminals can extract a lot of extra information on the user, that can be used to augment their illegal access to those users' online accounts."

"Coupled with the ability to remotely control users' machines, download data and run any file on them, this means that the fraudsters can insert partial or complete Internet pages into a live Web session, enabling to inject transactions at will or extract even more data from the hapless victims," he added.

This is another example , he went on to say, of the growing trend of regional malware where the cybercriminals operate targeted and segmented attacks on users, harvesting revenue from one bank's users one day, and, as that bank's security systems ramp up, move on to another regional bank another day, in this case the UK has been targeted. A pie chart showing the countries in which victims are based is available on the following link http://www.trusteer.com/sites/default/files/Zeusbotnetbycountry.jpg

In short, says Klein, this is a fraudster's ultimate paradise, giving them hidden access to the users' online financial and allied activities, as surely as if they were sat at their shoulder watching their every keystroke, move and online action.

In addition to gaining access to the botnet's servers Trusteer has also been able to access the interface used by the fraudsters to manage the botnet. This allows a very unique view into the way fraudsters operate Zeus botnets. The interface allows three main functionalities. The first is the ability to monitor the growth and footprint of the botnet with very accurate statistics and graphs showing the total number of bots, their distribution, newly added bots, count of active bots, etc. One example is a pie chart showing the operating systems running on the affected PCs, available on the following link http://www.trusteer.com/sites/default/files/ZeusbotnetOSstats.jpg

The second is a search function on all traffic generated by the bots. The botnet captures all HTTP and HTTPS traffic from infected computers and store it in a central MySQL database. A search tool allows the fraudsters to easily extract any type of information from the database. For example if the fraudsters are looking for credentials for a specific institution they can just type a part of the institution's URL into the search box and will immediately receive all HTTP/S requests that contain this pattern. From there they can extract the relevant login information. The third functionality allows criminals to push updates and other executables to specific bots or to the entire botnet. For example, they can push other pieces of malware or they can push a remote access programs that then allow them to remotely access the infected machine and control it.

Mickey Boodaei, Trusteer's CEO, says that the revelations surrounding the Zeus 2 botnet are the result of hundreds of man hours of effort behind the scenes by his security team, who constantly monitor for this type of activity.

This effort is part of an ongoing intelligence operation Trusteer is running in order to investigate the various aspects of fraud. We try to learn as much as possible on any piece of malware that targets the banks we work with. This information allows the banks to better understand immediate threats and take various actions, many of which are behind the scene to protect their customers against these attacks.

"It's important to realise that, despite its size, this is just one of many Zeus botnets operating all over the world. Its size and controllable actions are a clear demonstration of the increasing sophistication of cybercriminal gangs and how they can harness the power of driveby downloads, spam and general phishing trawls to create such a large swarm," he said.

"Zeus has become one of the most prevalent botnet trojans in the history of online bank fraud. Fighting financial malware requires banks to have accurate intelligence and strong fraud detection and mitigation capabilities. Fighting financial malware requires banks and their customers to work together. Internet users need to follow their bank's instructions and when asked download online banking security software such as from HSBC, NatWest, RBS and Santander which is specifically tuned to detect and resist specific threats that the bank identifies such as Zeus. Banks need to continue implementing multiple layers to detect, resist, and deactivate malware attacks and tightly integrate these layers together.

For more on Trusteer: www.trusteer.com

Trusteer

Trusteer, the world's leading provider of secure browsing services, helps prevent financial malware attacks through its Rapport and Flashlight services. Trusteer Rapport enables banks and online businesses to protect sensitive data such as account holder credentials from malware by locking down the browser and creating a tunnel for safe communication between the web site and customers' machines. It also prevents phishing by validating site authenticity. Trusteer Flashlight allows remote, effective, and instant investigation of malwarerelated fraud incidents. Trusteer's solutions are used by more than 60 leading financial organizations in North America and Europe and by more than 8 million of their customers. Trusteer is a privately held corporation led by former executives from RSA Security, Imperva, and Juniper. Follow us on www.Twitter.com/Trusteer.

For more information about our products and services, please visit www.trusteer.com.

The publisher indicated in each case is solely responsible for the press releases above, the event or job offer displayed, and the image and sound material used (see company info when clicking on image/message title or company info right column). As a rule, the publisher is also the author of the press releases and the attached image, sound and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.
Important note:

Systematic data storage as well as the use of even parts of this database are only permitted with the written consent of unn | UNITED NEWS NETWORK GmbH.

unn | UNITED NEWS NETWORK GmbH 2002–2023, All rights reserved

The publisher indicated in each case is solely responsible for the press releases above, the event or job offer displayed, and the image and sound material used (see company info when clicking on image/message title or company info right column). As a rule, the publisher is also the author of the press releases and the attached image, sound and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.