Risk
10/15/2010
04:16 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Microsoft Steps Up To Dethrone Zeus

Microsoft is throwing another punch at this most nasty and extremely active botnet.

Microsoft is throwing another punch at this most nasty and extremely active botnet.Early this month there was a flurry of arrests surrounding a cybercrime gang utilizing the dangerous triad of exploits, botnets, and money mules.

From Feds Bust Zeus Financial Cybercrime Ring earlier this month:

Federal and state authorities announced Thursday that they have charged numerous people in connection with a global cybercrime scheme using the Zeus financial malware toolkit to steal $3 million from U.S. bank accounts. The investigation was dubbed "Operation ACHing Mule," alluding to the attackers' use of Automatic Clearing House fraud, as well as "money mules" to move money.

According to Manhattan district attorney Cyrus Vance Jr., "this advanced cybercrime ring is a disturbing example of organized crime in the twenty-first century -- high-tech and widespread."

To help fight the Zeus botnet, Microsoft has added Zeus detection to its Malicious Software Removal Tool, or MSRT. MSRT is a free anti-malware tool that is released on patch Tuesday and scans most versions of Microsoft Windows for malware to disinfect.

From Microsoft's Malware Protection Center blog, it does seem the software maker is bent on ridding the world of as many Zeus infections as possible:

This family is quite prolific even if the intent behind some of the botnets is unclear. That said, we find ourselves knocking on Zbot's door this month, and we're glad we are. Zbot is the latest addition to MSRT's ever-growing list of malware, and we hope to continue protecting the Windows ecosystem with this new family firmly in our sights.

However, as Dark Reading points out in this post, Zeus isn't the only threat, botnets such as Bugat and Carberp also pose serious threats.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5142
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb 1.09 and earlier, as used in Mimbo Pro 2.3.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the src parameter.

CVE-2010-5302
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb before 1.15 as of 20100908 (r88), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.

CVE-2010-5303
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in the displayError function in timthumb.php in TimThumb before 1.15 (r85), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to $errorString.

CVE-2014-3562
Published: 2014-08-21
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.

CVE-2014-3577
Published: 2014-08-21
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.