Vulnerabilities / Threats

3/31/2011
02:17 PM
50%
50%

Trend Micro Nukes Zeus Botnet Server

PayPal, eBay, and the customers of at least 15 banks were targeted by the eliminated botnet.

How Firesheep Can Hijack Web Sessions
(click image for larger view)
Slideshow: How Firesheep Can Hijack Web Sessions
Antivirus security company Trend Micro on Wednesday said that it eliminated -- or "sinkholed" -- a Zeus botnet command-and-control (C&C) server.

"In February 2011, we successfully collaborated with CDMON, a registrar, to gain control of a Zeus botnet C&C server, thereby rendering it ineffective," said Trend Micro security researchers David Sancho and Rainer Link in a blog post.

According to a report (pdf) released by Trend Micro that detailed the takedown in greater detail, this particular Zeus botnet targeted customers of 15 banks in the United States, South America, and Europe, as well as multiple online payment providers, including eBay and PayPal.

"The lack of coherence regarding the targeted banks and the locations of the infected computers suggests that the botmaster just left a default configuration while spreading the Trojan around his own geographical area," according to the report. "This was a sign that he was still an amateur."

Zeus is a crimeware toolkit that's used to build botnets and steal sensitive financial information from people's PCs. There are multiple "Zeus botnets" in the wild, each of which reports back to the botmaster that created it.

Indeed, according to the Zeus Tracker, which is monitoring more than 500 Zeus C&C servers, there are at least 44 Zeus C&C servers running in Russia, 35 in the United States, 29 in Romania, and 28 in the Ukraine. As that suggests, even though Zeus also appears to have merged with SpyEye, a former competitor, people are still using the standalone Zeus malware toolkit.

The botnet sinkholed by Trend Micro appeared to have originated in the Americas. "We found that over 95% of the inbound requests to the C&C server came from South America, particularly from Mexico," said the Trend Micro researchers. "This indicates that the bot may have originated from Latin America or was created using the Spanish language. Its creator may have decided to target banks in Mexico and Chile as well, as these often still used single-factor authentication to secure their customers' accounts."

For the takedown, domain registrar CDMON -- through which the botmaster had registered the sites for his Zeus-driven attacks -- helped Trend Micro impersonate the real C&C server. "CDMON was kind enough to replace the server's original address with that of our own machine," according to the Trend Micro report. "This was enough to tell the bot clients that they should communicate with us instead of the cybercriminal." The security company said it collected three weeks' worth of data for analysis before deactivating the botnet.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.