Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/15/2011
01:41 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Still Spots Lots Of Zeus Infections

Rumors of Zeus' merger into SpyEye might have been exaggerated -- for now, anyway

Microsoft detects and cleans up between 60,000 and 100,000 machines infected with the Zeus Trojan each month, according to newly released data from the software giant.

Turns out that Zeus is alive and well despite rumors of its "death" or morph into the SpyEye Trojan. "...We're still seeing both distinct malware families out and about in the wild. Between the two, we're finding that they're responsible for a significant amount of the e-commerce-related fraud happening at any given time," wrote Matt McCormack of the Microsoft Malware Protection Center in Melbourne, Australia.

Microsoft snuck more protections from new Zeus malware variants into the latest version of its Malicious Software Removal Tool (MSRT), he said in a blog post today: "This month (carefully hidden under the Win32/Bamital blanket), employing the old adage 'fight fire with fire', we decided to fight sneakiness with sneakiness and quietly slipped a fairly major Win32/Zbot update into MSRT."

The software giant detected 103,391 Zeus-infected machines in March; 113,814 in April; 60,385 in May; 83,555 in June; 61,323 in July; and 89,994 in August.

McCormack said in his post that Microsoft "felt it was time to turn the screws tighter on Zbot again" given the steady stream of infections this year.

Security researchers have been closely watching for samples of a merged version of Zeus and SpyEye ever since "Slavik" or "Monstr," the author of Zeus, last year gave the source code to another crimeware author, "Gribodemon," a.k.a. "Harderma."

Trend Micro researchers earlier this year got their hands on a sample of the SpyEye builder that included an administration panel including some lines of Zeus code. The two malware families would make a powerful combination: While Zeus was able to remove some security applications, SpyEye was not.

Meanwhile, the source code for SpyEye was published on the Web in August, making it easily attainable and adaptable by cybercriminals. "One of the most dangerous Swiss Army knives in malware is now available to billions," Sean Bodmer, senior threat intelligence analyst at security vendor Damballa, said last month in the wake of the SpyEye leak.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I feel safe, but I can't understand a word he's saying."
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11111
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
CVE-2020-11112
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
CVE-2020-11113
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
CVE-2020-10374
PUBLISHED: 2020-03-30
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
CVE-2020-11104
PUBLISHED: 2020-03-30
An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if...