Top Categories

Spotlight

todayMarch 28, 2020

Case Study Mjolnir Security

Attack Type – Exploitation of novel / 0-day vulnerability

Scenario: Org2 is a specialist technology company based in the UK. The Org2 IT security operations team responded to an alert from its corporate anti-virus provider that a copy of password stealing malware had been found on three of its domain controllers. This was a serious incident, and an investigation [...]

Top Voted
Sorry, there is nothing for the moment.

Resurgence of Zeus

News + Malware + Botnet + Threat Intelligence Mjolnir Security todayAugust 3, 2019

Background
share close

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on various versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing.

In a blog post published by Cisco Talos Intelligence on Nov 2 2017, they talk about an interesting new find.

While it has become common for users to just google to learn about anything they do not know. In a quick google search, you can find just about anything. However, search results returned are not guaranteed to be safe. In such a situation, these threat actors have decided to take advantage of this behavior by using what is popularly known as Black Hat Search Engine Optimization techniques to make their malicious links more prevalent in the search results, enabling them to target users with the Zeus banking Trojan. By poisoning the search results for specific banking related keywords, the attackers were able to effectively target specific users in a novel fashion.

By targeting primarily financial-related keyword searches and ensuring that their malicious results are displayed, the attacker can attempt to maximize the conversion rate of their infections as they can be confident that infected users will be regularly using various financial platforms and thus will enable the attacker to quickly obtain credentials, banking and credit card information, etc.

In the course of an Incident Response investigation we did for a client recently, we found active Zeus C&C connection requests going to their infrastructure. Over the past 30 days, they had over 45k connections with 15k of them in the last 5 days alone.

We have built an active tracker to show counts as well as CnC address live for the for the last 7days as we continue to investigate. And the header image shows the infections we have seen till date.

We will keep updating as we learn more.

Reference: http://blog.talosintelligence.com/2017/11/zeus-panda-campaign.html

Infected domains here: https://github.com/securitywarrior/indicators-of-compromise/blob/master/zeus-ioc-June2018-Sep2018.csv

Written by: Mjolnir Security

Tagged as: , , , .

Previous post

Case Study Mjolnir Security / June 8, 2019

Oil and Gas

An insider threat is an organization worst nightmare, as the insider has the full knowledge of the crown jewels and is trusted implicitly. Any accidental or malicious act by an employee can potentially lead to catastrophic incidents that threaten a [...]


Similar posts