Feeds

UK cybercops cuff ZeuS Trojan suspect pair

Alleged Bonnie and Clyde of malware

Intelligent flash storage arrays

A Manchester couple have been arrested on suspicion of using the notorious ZeuS Trojan horse to commit banking fraud.

The unnamed man and woman, both 20, were arrested by officers from the Metropolitan Police's newly established Central e-Crime Unit (PCeU) on 3 November. The pair were arrested for offences under 1990 Computer Misuse Act and the 2006 Fraud Act, questioned by police and released on bail pending further inquiries.

The ZeuS or Zbot information-stealing Trojan is reckoned to have infected tens of thousands of computers around the world. Zbot is designed to record users' online bank account details, passwords and other personal information, before uploading this data onto servers controlled by cybercriminals.

Detective Inspector Colin Wetherill of the PCeU commented: "The ZeuS Trojan is a piece of malware used increasingly by criminals to obtain huge quantities of sensitive information from thousands of compromised computers around the world. The arrests represent a considerable breakthrough in our increasing efforts to combat online criminality."

The Manchester arrests are the first made in Europe in connection with the malware.

ZeuS is typically spammed out to prospected marks in emails with malicious attachments. A variety of social engineering tricks are used to con victims into opening these messages, or into following a link to a booby-trapped website and becoming infected.

"[ZeuS] is not just a single piece of malicious software - it's a family with many different members, all adopting different disguises in their attempt to infect users and steal information that could allow hackers to break into your bank account and social networking profiles," explained Graham Cluley, senior technology consultant at anti-virus firm Sophos. ®

Beginner's guide to SSL certificates

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.