Vulnerabilities / Threats
3/31/2011
02:17 PM
50%
50%

Trend Micro Nukes Zeus Botnet Server

PayPal, eBay, and the customers of at least 15 banks were targeted by the eliminated botnet.

How Firesheep Can Hijack Web Sessions
(click image for larger view)
Slideshow: How Firesheep Can Hijack Web Sessions
Antivirus security company Trend Micro on Wednesday said that it eliminated -- or "sinkholed" -- a Zeus botnet command-and-control (C&C) server.

"In February 2011, we successfully collaborated with CDMON, a registrar, to gain control of a Zeus botnet C&C server, thereby rendering it ineffective," said Trend Micro security researchers David Sancho and Rainer Link in a blog post.

According to a report (pdf) released by Trend Micro that detailed the takedown in greater detail, this particular Zeus botnet targeted customers of 15 banks in the United States, South America, and Europe, as well as multiple online payment providers, including eBay and PayPal.

"The lack of coherence regarding the targeted banks and the locations of the infected computers suggests that the botmaster just left a default configuration while spreading the Trojan around his own geographical area," according to the report. "This was a sign that he was still an amateur."

Zeus is a crimeware toolkit that's used to build botnets and steal sensitive financial information from people's PCs. There are multiple "Zeus botnets" in the wild, each of which reports back to the botmaster that created it.

Indeed, according to the Zeus Tracker, which is monitoring more than 500 Zeus C&C servers, there are at least 44 Zeus C&C servers running in Russia, 35 in the United States, 29 in Romania, and 28 in the Ukraine. As that suggests, even though Zeus also appears to have merged with SpyEye, a former competitor, people are still using the standalone Zeus malware toolkit.

The botnet sinkholed by Trend Micro appeared to have originated in the Americas. "We found that over 95% of the inbound requests to the C&C server came from South America, particularly from Mexico," said the Trend Micro researchers. "This indicates that the bot may have originated from Latin America or was created using the Spanish language. Its creator may have decided to target banks in Mexico and Chile as well, as these often still used single-factor authentication to secure their customers' accounts."

For the takedown, domain registrar CDMON -- through which the botmaster had registered the sites for his Zeus-driven attacks -- helped Trend Micro impersonate the real C&C server. "CDMON was kind enough to replace the server's original address with that of our own machine," according to the Trend Micro report. "This was enough to tell the bot clients that they should communicate with us instead of the cybercriminal." The security company said it collected three weeks' worth of data for analysis before deactivating the botnet.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1414
Published: 2015-02-27
Integer overflow in FreeBSD before 8.4 p24, 9.x before 9.3 p10. 10.0 before p18, and 10.1 before p6 allows remote attackers to cause a denial of service (crash) via a crafted IGMP packet, which triggers an incorrect size calculation and allocation of insufficient memory.

CVE-2015-2072
Published: 2015-02-27
Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs or...

CVE-2015-2075
Published: 2015-02-27
SAP BussinessObjects Edge 4.0 allows remote attackers to delete audit events from the auditee queue via a clearData CORBA operation, aka SAP Note 2011396.

CVE-2015-2076
Published: 2015-02-27
The Auditing service in SAP BussinessObjects Edge 4.0 allows remote attackers to obtains sensitive information by reading an audit event, aka SAP Note 2011395.

CVE-2015-2101
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in the Navigate bar in the Navigate module before 6.x-1.1 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.