|Additional Names||ZeuS Trojan|
|Type of Malware||Virus|
|Location – Country of Origin||Russia|
|Date of initial activity||2011|
|Motivation||Harvest banking information, such as login credentials to “filter” money away from banking customers|
|Targeted System||Any computer that is connected to the internet|
It mainly targets finances and can easily access your bank account details and get away with all the available funds. The worst part about the malware is that it does not incorporate a centralized command and control server, unlike most viruses. This makes it a bit hard for authorities to target and locate it. The malware can bypass even the most robust centralized servers and integrate its independent servers to get into the system. This means that you cannot trace the stolen funds.
Banking customers and HR Departments.
Tools/ Techniques Used
Botnet, Spam and Phishing messages.
Impact / Significant Attacks
GOZ was able to infect 1 million computers globally, and losses were estimated to be in the hundreds of millions of dollars.