Feeds

Gameover ZeuS botnet pulls dripping stake from heart, staggers back from the UNDEAD

Zombies twitch, lurch to feet after FBI takedown

Protecting against web application threats using SSL

The Gameover ZeuS malware is back from the dead just six weeks after a takedown operations that aimed to put a stake through the heart of the botnet, which is linked to the even more infamous CryptoLocker ransomware.

International law enforcement acted against the crooks behind the Gameover ZeuS in early June. For the past month, the botnet formed by this malware was largely inactive, according to net security firm Sophos.

GameOver ZeuS, which is estimated to have infected more than 500,000 machines worldwide, is designed to steal financial and personal information from compromised PCs. Gameover ZeuS was a common distribution mechanism for CryptoLocker prior to June's takedown op. Cybercrooks behind the latest variant appear to have regressed to using older tricks involving infected email attachments and spam.

Now a new variant of Gameover ZeuS is being used to establish a zombie network. Sophos reports that the new variant is distributed through widespread spam campaigns, meaning the number of infections may already be large. Dodgy messages pose as online bank account statements, it said. The attachments of these messages are actually riddled with malware.

Some features of the old version have been dropped, including parts that were supposed to make it more sophisticated, in a move towards greater simplicity. In particular, the latest variant of the malware swaps P2P for fast-flux communication.

The latest variant of the malware tries phoning home to 1,000 domain names per day in order to receive command-and-control instructions. The crooks seem to be leaving it until the last minute to register domains they intend to use, according to an analysis of the latest variant by James Wyke, a senior threat researcher at Sophos.

The Gameover ZeuS takeover operation is June was accompanied by criminal charges against 30-year-old Russian national Evgeniy Mikhailovich Bogachev, who is suspected of running the botnet.

"We can't yet say whether this new variant is the old guys back... or someone completely new who acquired the source code," according to Sophos, which has added detection for the variant to its enterprise-focused security software packages.

The security software maker adds that it's too early to say whether the comeback campaign is likely to prove successful. Peter Kruse, a partner and eCrime specialist at Danish security consultancy CSIS, estimated there were 1,000 infections of machines contaminated with the new variant as of last Friday (11 July). ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.