Resurgence of Zeus

 In Botnet, Malware, News, Threat Intelligence

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on various versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing.

In a blog post published by Cisco Talos Intelligence on Nov 2 2017, they talk about an interesting new find.

While it has become common for users to just google to learn about anything they do not know. In a quick google search, you can find just about anything. However, search results returned are not guaranteed to be safe. In such a situation, these threat actors have decided to take advantage of this behavior by using what is popularly known as Black Hat Search Engine Optimization techniques to make their malicious links more prevalent in the search results, enabling them to target users with the Zeus banking Trojan. By poisoning the search results for specific banking related keywords, the attackers were able to effectively target specific users in a novel fashion.

By targeting primarily financial-related keyword searches and ensuring that their malicious results are displayed, the attacker can attempt to maximize the conversion rate of their infections as they can be confident that infected users will be regularly using various financial platforms and thus will enable the attacker to quickly obtain credentials, banking and credit card information, etc.

In the course of an Incident Response investigation we did for a client recently, we found active Zeus C&C connection requests going to their infrastructure. Over the past 30 days, they had over 45k connections with 15k of them in the last 5 days alone.

We have built an active tracker to show counts as well as CnC address for the last 30 days as we continue to investigate. And the header image shows the infections we have seen till date.

If you focus on the data returned, you can see:

hwid=1640050058&pc=COMPUTER_22c75ffe&localip=192.168.1.105&winver=Windows%20XP%20Professional%20×32
hwid=1345544779&pc=COMPUTER_22c32657&localip=192.168.1.105&winver=Windows%20XP%20Professional%20×32
hwid=9351997957&pc=COMPUTER_34153fc7&localip=192.168.1.105&winver=Windows%20XP%20Professional%20×32
hwid=0394793442&pc=COMPUTER_2578a297&localip=192.168.1.105&winver=Windows%20XP%20Professional%20×32
hwid=1209533196&pc=COMPUTER_3449a6b1&localip=192.168.1.105&winver=Windows%20XP%20Professional%20×32

This shows the Hardware ID was returned, name of the Windows PC was returned, local LAN IP and the Windows version – Xp Pro 32bit

In a few, email information was retrieved too

email=7727086048@metropcs.sms.us
email=mbarragan5@gv.rr.com
email=zarine72@mail.com

 

We will keep updating as we learn more.

Reference: http://blog.talosintelligence.com/2017/11/zeus-panda-campaign.html

Indicators of Compromise will be posted soon

Recent Posts

Start typing and press Enter to search