Zeus botnet thriving despite arrests in the US, UK

The most recent data shows that Zeus' command-and-control servers are still functioning

The Zeus botnet remains a robust network that is difficult to destroy despite an international sting operation that saw dozens arrested this week for allegedly stealing money from online bank accounts.

Zeus is an advanced piece of malicious software that can intercept online banking details and initiate money transfers. It can infect computers that have software with coding flaws that have not been fixed.

Law enforcement officials arrested more than 100 people, mostly from Eastern Europe, in raids in the U.S. and U.K. this week on charges of money laundering, document fraud and conspiracy. The people were allegedly part of a large computer hacking money-laundering operation believed to have stolen more than US$260 million from businesses and consumers.

While it's encouraging to see law enforcement investigate, Zeus is still a problem, said Andre' M. Di Mino, a co-founder of the Shadowserver Foundation, an organization that tracks botnets.

"It's too early to determine or enumerate any key changes to Zeus itself," Di Mino said. "It remains fully operational and the security community continues to research and track it."

Victims can become infected with Zeus by visiting Web sites that are engineered to attack visitors' computers. Once those computers are infected, the attackers can siphon data and control the PCs using command-and-control (C&C) servers. Attackers often look for vulnerable Web sites in order to install the command-and-control software, which helps hide their tracks.

The arrests appear to not have had a significant technical impact on the Zeus botnet. As of Friday, at least 170 C&Cs for Zeus are still online, according to statistics compiled by the administrator of Zeus Tracker.

The statistics are updated three times a day and come from sources such as antivirus vendors, sandbox systems and other third-party sources, said the administrator of Zeus Tracker, who did not want to be identified.

The Zeus Tracker website records some of the most important information for those who are tracking Zeus-related websites, such as which ISP is hosting an infected domain and which registrar sold the domain name.

For a C&C server to be removed from the Internet, either one of three things must happen: the Zeus bot can be scrubbed from the computer by security software; the registrar can revoke the malicious domain name; or an ISP can take the offending server that is infected offline.

But security researchers have had problems with getting action taken by some registrars or ISPs, which sometimes ignore abuse requests.

On Friday, the Zeus tracker shows that the Russian registrar Reg.ru sold 10 domain names that are now being used for Zeus-related activity. Seven of those domain names are redirecting to one domain that recently hosted Zeus files, the tracker shows. At least two of those redirect domains have been active since Sept. 7, with four more active since Sept. 12.

The most recent domain name sold through Reg.ru was added to Zeus Tracker on Wednesday. That server temporarily hosted two kinds of Zeus files that have since been removed. It is possible that the owner of that domain discovered the infection and then removed the offending files.

A Reg.ru spokeswoman said that the company would look into those domains. Reg.ru, which is run out of Russia, "always promptly reacts" to inquiries or complaints from third-parties or law enforcement agencies, she said.

The issue highlight the difficulties security researchers and law enforcement have in trying to tackle botnets, which have been purposely built to be robust and redundant, much like how corporations structure their own IT systems.

But the security community has had some success in weakening and nearly wiping out botnets, but it has taken highly coordinated efforts.

Earlier this year, Microsoft petitioned a court to compel VeriSign, the .com registry, to remove 277 ".com" names from its rolls. That action cut off communication between the Waledac botnet's C&Cs and its infected troupe of computers.

Simultaneously, Microsoft recruited a team of crack computer security researchers who were able to infiltrate Waledac's peer-to-peer control system and command those infected machines to report to their own servers, cutting the cybercriminals off from their own botnet.

It doesn't appear that there are similar efforts under way to do a technical take down of Zeus to coincide the arrests. And to mount one would be difficult, said Thorsten Holz, an assistant professor of computer science at Ruhr-University in Bochum, Germany, who participated in the Waledac action.

Since criminal groups can license the Zeus software from its development group, they can set up their own C&Cs, Holz said.

"This leads to the huge number of C&Cs, which in turn render Zeus take downs in a coordinated fashion pretty hard," Holz said. "And even if many of the current C&Cs are taken down, new groups will likely emerge that run new C&Cs.

"Nevertheless the arrests are a good signal in my humble opinion since they show that there are investigations in this area which are successful," he said.

Send news tips and comments to jeremy_kirk@idg.com

Join the PC World newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Zeus TrackersecurityThe Shadowserver FoundationlegalExploits / vulnerabilitiesdata protectionmalwarecybercrimeantivirusfraudCriminal

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Armand Abogado

HP OfficeJet 250 Mobile Printer

Wireless printing from my iPhone was also a handy feature, the whole experience was quick and seamless with no setup requirements - accessed through the default iOS printing menu options.

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?