Name | Zeus Gameover |
Additional Names | ZeuS Trojan |
Type of Malware | Virus |
Location – Country of Origin | Russia |
Date of initial activity | 2011 |
Associated Groups | CryptoLocker |
Motivation | Harvest banking information, such as login credentials to “filter” money away from banking customers |
Attack Vectors | |
Targeted System | Any computer that is connected to the internet |
Overview
It mainly targets finances and can easily access your bank account details and get away with all the available funds. The worst part about the malware is that it does not incorporate a centralized command and control server, unlike most viruses. This makes it a bit hard for authorities to target and locate it. The malware can bypass even the most robust centralized servers and integrate its independent servers to get into the system. This means that you cannot trace the stolen funds.
Targets
Banking customers and HR Departments.
Tools/ Techniques Used
Botnet, Spam and Phishing messages.
Impact / Significant Attacks
GOZ was able to infect 1 million computers globally, and losses were estimated to be in the hundreds of millions of dollars.