News Advanced Threats
'Gameover Zeus' Gang Launches New Attacks
Campaign includes rigged emails spoofing major U.S. banks and offering 'secure email' exchange with banking customers
The cybercrime group behind the Gameover Zeus Trojan that steals online banking creds and credit card numbers is waging a massive malicious email campaign that enlists the massive Cutwail spamming botnet to blast its emails.
Millions of emails -- many of which pose as coming from major U.S. banks -- have been spammed out in recent weeks, according to Dell SecureWorks' Counter Threat Unit. The phony but convincing-looking emails appeal to a more security-minded banking customer: "You have received a new encrypted message or a secure message from [XYZ] Bank," one of the email campaigns says, noting that the bank has set up a secure email exchange for its customers as a way to allay privacy and security concerns.
More Security Insights
- Remote Data Replication: Combat Disasters And Optimize Business Operations
- Check Point 2013 Internet Security Report
- Strengthening Enterprise Defenses With Threat Intelligence
- Strategy: Advanced Persistent Threats: The New Reality
The message includes an infected attachment that the "bank" requires for download and registration to the supposed secure email system. Once downloaded, it executes the pony downloader Trojan that installs Gameover and steals online banking credentials, credit card account numbers, and other information.
Another email campaign claims the recipient has received a fax, scan, or voicemail, and includes a "free program" for retrieving the message -- but, of course, the attachment installs the malware.
The Gameover gang, unlike some cybercrime groups, doesn't lease or sell its malware or services. It's a closed operation that, instead, sometimes contracts resources such as the Cutwail botnet to transport its attacks. More than half of the Top 20 Fortune 500 firms were infected with the Trojan as of this summer, according to SecureWorks, which in July published a report on Gameover
"This particular group has found a combination of malware, tactics, and procedures that leads to success for them. They will continue to follow the same process [of working this way]," says Jon Ramsey, CTO of Dell SecureWorks. "The malware they use is a private version of theirs, and they don't sell it on the black market. They feel there's more of an upside financially in keeping it private."
Ramsey says the gang has had plenty of success creating large botnets for both sending more malicious spam and conducting distributed denial-of-service attacks. They're using a dual-botnet sort of model with Cutwail transporting the spam, and subsequently infected Gameover bots spreading their infections and doing the Gameover botnet operators' bidding.
About 678,205 machines were infected with Gameover Zeus in August, according to SecureWorks, and it's the biggest botnet targeting financial institutions today. Fourteen of the 20 top Fortune 500 firms are infected, including financial services firms, defense contractors, government agencies, law enforcement, military, and universities.
The peer-to-peer Gameover botnet was structured to deter disruption and to make attribution more difficult. Even so, peer-to-peer botnets are easier to "poison" by using phony peers that allow researchers to sinkhole traffic, according to Brett Stone-Gross, who has closely studied Gameover.
"The P2P ZeuS crew receives considerable support from the products and services offered by the underground community, who collectively fulfill vital functions to plan and execute a large successful cybercriminal operation. Moreover, the large number of compromised personal computers and web servers provide a robust and low cost infrastructure for a variety of malicious activities," Stone-Gross wrote in his report.
[Trade-offs are a fact of life for network defenders, but attackers have to abide them as well. See The Attacker's Trade-Off: Stealth Versus Resilience.]
Cutwail, one of the world's largest botnets, to date contains around 500,000 or so bots, according to SecureWorks data.
Researchers at LookingGlass Cyber Solutions say the top 10 countries infected by the Cutwail botnet, in order, are: India, Iran, China, Vietnam, Ukraine, Kazakhstan, Belarus, the U.S., South Korea, and Brazil.
"We saw 43,332 unique hosts infected with Cutwail on December 3, 2012," says Jason Lewis, chief scientist with LookingGlass. Overall, the researchers saw some 203,117 bots sending spam -- from botnets including Cutwail, Asprox, Festi, and Kelihos.
"About 3,000 hosts had multiple infections," Lewis says.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.