Page 2 of 2 FirstFirst 12
Results 11 to 12 of 12

Thread: Pandemic of the Botnets 2014

  1. #11
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Gameover Zeus variant resumes activity

    FYI...

    Gameover Zeus Variant Resumes Activity
    - https://atlas.arbor.net/briefs/index#170748218
    17 Jul 2014
    A new variant based on the GameOver Zeus Trojan has been identified distributing spam.
    Analysis: While the original GameOver Zeus was taken down by law enforcement last month, this new variant suggests that cyber criminals will continue to leverage this malware. Past law enforcement operations on active botnets, while temporarily successful, have done little to fully disrupt malicious activity, as criminals frequently find new available malware and tools. [ http://blog.malcovery.com/blog/break...r-zeus-returns , http://nakedsecurity.sophos.com/2014...from-the-dead/ ]

    - http://www.secureworks.com/resources...er-capability/
    July 11, 2014

    - https://www.virustotal.com/en-gb/fil...ysis/#comments

    Last edited by AplusWebMaster; 2014-07-20 at 20:22.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #12
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Citadel botnet - Zeus descendent ...

    FYI...

    Citadel botnet - Zeus descendent ...
    - https://www.virusbtn.com/virusbullet...el-1#id3373382
    2014-09-02 - "Cybercrime is increasing because it is a lucrative business. In turn, this has led to a growth in crimeware services as well as automated exploitation and malware infection frameworks [1]. Botnets play a crucial role in that growth, with successful botnets containing large numbers (sometimes millions) of infected computers. Amassing such a large network of bots requires automation, and browser exploit packs (BEPs) have become the primary tool for automating the browser exploitation process. Drive-by download attacks drive users to BEPs, which then infect the users’ computers. In 2008, Provos et al. collected approximately three million malicious URLs hosting BEPs, accounting for 1.3% of all first-page Google search query results over a period of 10 months. Vulnerable browsers are -exploited- and malicious payloads are -executed- with droppers downloaded onto victims’ systems. The droppers then extract the bots and install them silently. Botnets like Zeus (or Zbot) have redefined cybercrime because of their skilled design and ability to target online financial and banking institutions..."
    1] http://www.sciencedirect.com/science...74548213000036

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •