Feeds

Did ZeuS's daddy give hard Trojan love to rival cybercrook?

Über-powerful malware baby may be on its way

Secure remote control for conventional and virtual desktops

The author of the infamous ZeuS crimeware toolkit may have handed over its development to a former rival in the banking Trojan development business.

"Slavik" has handed over the ZeuS source code to SpyEye developer "Harderman", according to an investigation by security blogger and former Washington Post reporter Brian Krebs - and based on posts on numerous Russian language underground cybercrime forums. Slavik's apparent handover is surprising because SpyEye, a relative newcomer to the world of banking Trojans, was programmed to overwrite ZeuS installations on compromised PCs.

The deal between the two presumed rivals reportedly contains the stipulation that Harderman continues to support the cybercrooks who pay thousands for customised versions of ZeuS. Slavik may have decided to lay low as a result of a recent string of cybercrime prosecutions against ZeuS phishing mules in the US and UK as well as the arrest of five alleged bot herders in the Ukraine. The arrest of crooks suspected of masterminding phishing operations using versions of ZeuS and controlling networks of compromised PCs strikes much closer to home for Slavik.

In addition, Microsoft began adding detection for ZeuS into its Malicious Software Removal Tool earlier this month, claiming early success with the clean-up of an estimated 274,000 PCs. The move follows months of reports of online banking losses linked to the distribution of variants of ZeuS.

Krebs reports that Slavik is no longer reachable for ZeuS-support questions and may have gone off-grid or at least offline. Meanwhile Harderman is reportedly advancing plans to merge the best features of ZeuS and SpyEye together along with the addition of rootlet functionality to create a even more powerful strain of malware. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.