The lifecycle of peer-to-peer (Gameover) ZeuS

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

The lifecycle of peer-to-peer (Gameover) ZeuS
Botnet Gameover, Cutwail, Pony, Dirt Jumper
Malware
Botnet/malware group
Exploit kits Blackhole
Services
Feature
Distribution vector
Target
Origin
Campaign Gameover (campaign)
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-07-23
Editor/Conference DELL SecureWorks
Link http://www.secureworks.com/cyber-threat-intelligence/threats/The Lifecycle of Peer to Peer Gameover ZeuS/ (Archive copy)
Author Brett Stone-Gross
Type

Abstract

The Dell SecureWorks Counter Threat Unit(TM) (CTU) research team continues to monitor the latest advancements to the ZeuS banking Trojan horse malware family. One of the most significant developments since the leak of the ZeuS source code in May 2011 has been the introduction of a private peer-to-peer (P2P) version, first identified in October 2011, which removes the centralized command and control (C2) infrastructure previously required to push configuration files, updates, and collect information harvested from infected computers. Over the past year, CTU researchers have tracked the tools, techniques, and modus operandi of the attackers behind the P2P version of ZeuS, and have gained a comprehensive view into the thriving underground economy.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1188,
   editor = {DELL SecureWorks},
   author = {Brett Stone-Gross},
   title = {The lifecycle of peer-to-peer (Gameover) ZeuS},
   date = {23},
   month = Jul,
   year = {2012},
   howpublished = {\url{http://www.secureworks.com/cyber-threat-intelligence/threats/The_Lifecycle_of_Peer_to_Peer_Gameover_ZeuS/}},
 }