This week at Smarttech247 our technical teams have been discussing Zeus, aka Zbot, a modular banking trojan which uses keystroke logging to compromise victims’ credentials when users visit a banking website. Zeus was first seen in 2007 and was made freely available to the public by its creator in 2011. Its objective? To steal banking information for financial gain. It can be delivered to devices through 3 methods: phishing, spam and drive-by download. The initial impact when the malware started its infiltration affected more than 3.6 million PCs in the United States causing over $70 million in damages. Anyone using a Windows PC can fall victim to the Zeus virus, even with up-to-date antivirus, it can be near impossible to detect.
Since created, Zeus has been the reason for millions of
infected PCs and it has been used to steal data from organisations such as
NASA, Monster.com, Oracle, Cisco and Amazon. It was designed to harvest banking
credentials from the computers it infects by monitoring the websites its users
visit and keystroke logging. When the virus recognises the user is on a banking
website, it will record the keys pressed in order to log into the website,
saving the credentials.
The virus can also act as a botnet allowing the individual
to extract large amounts of data and execute large scale attacks by commanding
a large network of infiltrated devices.
As earlier stated, the attacks usually infect in three ways:
phishing, spam and drive-by download. The phishing emails are often customised
to fool employees to make it look as though the email is coming from within the
organisation they are working for. The email will often be targeted at system
administrators or management level employees in the hope they may log onto the
system the hacker wants access to.
The attack can also be found to arrive in spam, both emails
and social media messaging. A link is contained within the email or social
media post that once it is clicked, the user is directed to a website that
automatically installs the virus. The virus is created to steal credentials so
will often steal the credentials of the email and social media accounts used to
click the link to further spread the message from what you may think is a
The final way the virus uses to infect devices is through a
drive-by download. Hackers are able to
contaminate legitimate websites that the user may have used before to
automatically download the virus file and execute it on the device.
The Zeus virus initially only affected Windows computers but
there have been instances that affect Android, Blackberry and Symbian devices. The
creator of the virus made the Zeus source code publicly available in 2011, allowing
for the creation of a number of new, updated instances of the malware. Even
though the original Zeus malware has been largely neutralized, the Trojan lives
on as its mechanisms are used in a large number of new malware types.
Protecting yourself from the Zeus virus can be difficult as
it can be impossible to detect. As with all types of malware, the most logical
first step is keeping your antivirus up-to-date, and run regular full scans.
Ensure you educate your staff on how to detect phishing attacks and what to do
if they aren’t sure of the contents of an email and never click on suspicious
links be it on social media or in email.
Find out more