Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/15/2011
01:41 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Still Spots Lots Of Zeus Infections

Rumors of Zeus' merger into SpyEye might have been exaggerated -- for now, anyway

Microsoft detects and cleans up between 60,000 and 100,000 machines infected with the Zeus Trojan each month, according to newly released data from the software giant.

Turns out that Zeus is alive and well despite rumors of its "death" or morph into the SpyEye Trojan. "...We're still seeing both distinct malware families out and about in the wild. Between the two, we're finding that they're responsible for a significant amount of the e-commerce-related fraud happening at any given time," wrote Matt McCormack of the Microsoft Malware Protection Center in Melbourne, Australia.

Microsoft snuck more protections from new Zeus malware variants into the latest version of its Malicious Software Removal Tool (MSRT), he said in a blog post today: "This month (carefully hidden under the Win32/Bamital blanket), employing the old adage 'fight fire with fire', we decided to fight sneakiness with sneakiness and quietly slipped a fairly major Win32/Zbot update into MSRT."

The software giant detected 103,391 Zeus-infected machines in March; 113,814 in April; 60,385 in May; 83,555 in June; 61,323 in July; and 89,994 in August.

McCormack said in his post that Microsoft "felt it was time to turn the screws tighter on Zbot again" given the steady stream of infections this year.

Security researchers have been closely watching for samples of a merged version of Zeus and SpyEye ever since "Slavik" or "Monstr," the author of Zeus, last year gave the source code to another crimeware author, "Gribodemon," a.k.a. "Harderma."

Trend Micro researchers earlier this year got their hands on a sample of the SpyEye builder that included an administration panel including some lines of Zeus code. The two malware families would make a powerful combination: While Zeus was able to remove some security applications, SpyEye was not.

Meanwhile, the source code for SpyEye was published on the Web in August, making it easily attainable and adaptable by cybercriminals. "One of the most dangerous Swiss Army knives in malware is now available to billions," Sean Bodmer, senior threat intelligence analyst at security vendor Damballa, said last month in the wake of the SpyEye leak.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17537
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file deletion via the web/polygon/problem/deletefile?id=1&name=../ substring.
CVE-2019-17538
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&name=../ substring.
CVE-2019-17535
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows blog-list.php XSS, in both the gila-blog and gila-mag themes, via the search parameter, a related issue to CVE-2019-9647.
CVE-2019-17536
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows Unrestricted Upload of a File with a Dangerous Type via the moveAction function in core/controllers/fm.php. The attacker needs to use admin/media_upload and fm/move.
CVE-2019-17533
PUBLISHED: 2019-10-13
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.