Top Categories


todayFebruary 3, 2021

News + Malware + Botnet + Ransomware Mjolnir Security

Fall of Emotet

On January 27, 2021, news broke from Europol that a collaborative effort had effectively taken down and disrupted one of the most significant botnets in the past decade – Emotet. This global action and collaborative initiative incorporated authorities in the Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, [...]

Resurgence of Zeus

News + Malware + Botnet + Threat Intelligence Mjolnir Security todayAugust 3, 2019

share close

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on various versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing.

In a blog post published by Cisco Talos Intelligence on Nov 2 2017, they talk about an interesting new find.

While it has become common for users to just google to learn about anything they do not know. In a quick google search, you can find just about anything. However, search results returned are not guaranteed to be safe. In such a situation, these threat actors have decided to take advantage of this behavior by using what is popularly known as Black Hat Search Engine Optimization techniques to make their malicious links more prevalent in the search results, enabling them to target users with the Zeus banking Trojan. By poisoning the search results for specific banking related keywords, the attackers were able to effectively target specific users in a novel fashion.

By targeting primarily financial-related keyword searches and ensuring that their malicious results are displayed, the attacker can attempt to maximize the conversion rate of their infections as they can be confident that infected users will be regularly using various financial platforms and thus will enable the attacker to quickly obtain credentials, banking and credit card information, etc.

In the course of an Incident Response investigation we did for a client recently, we found active Zeus C&C connection requests going to their infrastructure. Over the past 30 days, they had over 45k connections with 15k of them in the last 5 days alone.

We have built an active tracker to show counts as well as CnC address live for the for the last 7days as we continue to investigate. And the header image shows the infections we have seen till date.

We will keep updating as we learn more.


Infected domains here:

Written by: Mjolnir Security

Tagged as: , , , .

Previous post

Case Study Mjolnir Security / June 8, 2019

Oil and Gas

An insider threat is an organization worst nightmare, as the insider has the full knowledge of the crown jewels and is trusted implicitly. Any accidental or malicious act by an employee can potentially lead to catastrophic incidents that threaten a [...]

Similar posts