{"id":416,"date":"2013-05-24T00:00:00","date_gmt":"2013-05-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/24\/zeus-variants-are-back-with-a-vengeance\/"},"modified":"2021-12-30T11:37:16","modified_gmt":"2021-12-30T11:37:16","slug":"zeus-variants-are-back-with-a-vengeance","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/24\/zeus-variants-are-back-with-a-vengeance\/","title":{"rendered":"Zeus variants are back with a vengeance"},"content":{"rendered":"<p style=\"margin: 0px;\">After analyzing the feedback from the company&#8217;s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus \/ Zbot Trojan infections. After being practically non-existent in January, the rest of the months up until the beginning of May have witnesses a continuos rise in numbers of attempted Zeus\/Zbot Trojan infections, Trend Micro researchers pointed out. The main goal of the malware is the same as before: stealing any type of online credentials, including those user for online banking, and any kind of personal information that might be of use to criminally-minded individuals. They now create two different folders on the system: one to stash a copy of themselves, and the other to host the stolen and encrypted information and the configuration file they download from a remote server.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">The difference in GameOver variant is that it opens a random UDP port and sends encrypted packets before sending DNS queries to randomized domain names.&#8221;<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Configuration files are, as usual, subject to change depending on which information the attackers want to steal, and the malware still tries to prevent browsers from being able to visit security sites. <span style=\"font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 13px;\">What was previously put in one folder in Windows&#8217;<\/span><i style=\"font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 13px;\">%System%<\/i> <span style=\"font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 13px;\">folder is now in to random-named folders in the<\/span><i style=\"font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 13px;\">%Applications Data%<\/i> <span style=\"font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 13px;\">folder.<\/span><\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">&#8220;What we can learn from ZeuS \/ Zbot\u2019s spike in recent months is simple: old threats like Zbot can always make a comeback because cybercriminals profit from these,&#8221; the researchers warn and advise: &#8220;It is important to be careful in opening email messages or clicking links.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.net-security.org\/malware_news.php?id=2504&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29\">http:\/\/www.net-security.org\/malware_news.php?id=2504&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-416","post","type-post","status-publish","format-standard","hentry","category-malware"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=416"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/416\/revisions"}],"predecessor-version":[{"id":2903,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/416\/revisions\/2903"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}