The lifecycle of peer-to-peer (Gameover) ZeuS
(Publication) Google search: [1]
The lifecycle of peer-to-peer (Gameover) ZeuS | |
---|---|
Botnet | Gameover, Cutwail, Pony, Dirt Jumper |
Malware | |
Botnet/malware group | |
Exploit kits | Blackhole |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | Gameover (campaign) |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-07-23 |
Editor/Conference | DELL SecureWorks |
Link | http://www.secureworks.com/cyber-threat-intelligence/threats/The Lifecycle of Peer to Peer Gameover ZeuS/ (Archive copy) |
Author | Brett Stone-Gross |
Type |
Abstract
“ The Dell SecureWorks Counter Threat Unit(TM) (CTU) research team continues to monitor the latest advancements to the ZeuS banking Trojan horse malware family. One of the most significant developments since the leak of the ZeuS source code in May 2011 has been the introduction of a private peer-to-peer (P2P) version, first identified in October 2011, which removes the centralized command and control (C2) infrastructure previously required to push configuration files, updates, and collect information harvested from infected computers. Over the past year, CTU researchers have tracked the tools, techniques, and modus operandi of the attackers behind the P2P version of ZeuS, and have gained a comprehensive view into the thriving underground economy.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1188, editor = {DELL SecureWorks}, author = {Brett Stone-Gross}, title = {The lifecycle of peer-to-peer (Gameover) ZeuS}, date = {23}, month = Jul, year = {2012}, howpublished = {\url{http://www.secureworks.com/cyber-threat-intelligence/threats/The_Lifecycle_of_Peer_to_Peer_Gameover_ZeuS/}}, }