Zeus botnet thriving despite arrests in the US, UK

The most recent data shows that Zeus' command-and-control servers are still functioning

The Zeus botnet remains a robust network that is difficult to destroy despite an international sting operation that saw dozens arrested this week for allegedly stealing money from online bank accounts.

Zeus is an advanced piece of malicious software that can intercept online banking details and initiate money transfers. It can infect computers that have software with coding flaws that have not been fixed.

Law enforcement officials arrested more than 100 people, mostly from Eastern Europe, in raids in the U.S. and U.K. this week on charges of money laundering, document fraud and conspiracy. The people were allegedly part of a large computer hacking money-laundering operation believed to have stolen more than US$260 million from businesses and consumers.

While it's encouraging to see law enforcement investigate, Zeus is still a problem, said Andre' M. Di Mino, a co-founder of the Shadowserver Foundation, an organization that tracks botnets.

"It's too early to determine or enumerate any key changes to Zeus itself," Di Mino said. "It remains fully operational and the security community continues to research and track it."

Victims can become infected with Zeus by visiting Web sites that are engineered to attack visitors' computers. Once those computers are infected, the attackers can siphon data and control the PCs using command-and-control (C&C) servers. Attackers often look for vulnerable Web sites in order to install the command-and-control software, which helps hide their tracks.

The arrests appear to not have had a significant technical impact on the Zeus botnet. As of Friday, at least 170 C&Cs for Zeus are still online, according to statistics compiled by the administrator of Zeus Tracker.

The statistics are updated three times a day and come from sources such as antivirus vendors, sandbox systems and other third-party sources, said the administrator of Zeus Tracker, who did not want to be identified.

The Zeus Tracker website records some of the most important information for those who are tracking Zeus-related websites, such as which ISP is hosting an infected domain and which registrar sold the domain name.

For a C&C server to be removed from the Internet, either one of three things must happen: the Zeus bot can be scrubbed from the computer by security software; the registrar can revoke the malicious domain name; or an ISP can take the offending server that is infected offline.

But security researchers have had problems with getting action taken by some registrars or ISPs, which sometimes ignore abuse requests.

On Friday, the Zeus tracker shows that the Russian registrar Reg.ru sold 10 domain names that are now being used for Zeus-related activity. Seven of those domain names are redirecting to one domain that recently hosted Zeus files, the tracker shows. At least two of those redirect domains have been active since Sept. 7, with four more active since Sept. 12.

The most recent domain name sold through Reg.ru was added to Zeus Tracker on Wednesday. That server temporarily hosted two kinds of Zeus files that have since been removed. It is possible that the owner of that domain discovered the infection and then removed the offending files.

A Reg.ru spokeswoman said that the company would look into those domains. Reg.ru, which is run out of Russia, "always promptly reacts" to inquiries or complaints from third-parties or law enforcement agencies, she said.

The issue highlight the difficulties security researchers and law enforcement have in trying to tackle botnets, which have been purposely built to be robust and redundant, much like how corporations structure their own IT systems.

But the security community has had some success in weakening and nearly wiping out botnets, but it has taken highly coordinated efforts.

Earlier this year, Microsoft petitioned a court to compel VeriSign, the .com registry, to remove 277 ".com" names from its rolls. That action cut off communication between the Waledac botnet's C&Cs and its infected troupe of computers.

Simultaneously, Microsoft recruited a team of crack computer security researchers who were able to infiltrate Waledac's peer-to-peer control system and command those infected machines to report to their own servers, cutting the cybercriminals off from their own botnet.

It doesn't appear that there are similar efforts under way to do a technical take down of Zeus to coincide the arrests. And to mount one would be difficult, said Thorsten Holz, an assistant professor of computer science at Ruhr-University in Bochum, Germany, who participated in the Waledac action.

Since criminal groups can license the Zeus software from its development group, they can set up their own C&Cs, Holz said.

"This leads to the huge number of C&Cs, which in turn render Zeus take downs in a coordinated fashion pretty hard," Holz said. "And even if many of the current C&Cs are taken down, new groups will likely emerge that run new C&Cs.

"Nevertheless the arrests are a good signal in my humble opinion since they show that there are investigations in this area which are successful," he said.

Send news tips and comments to jeremy_kirk@idg.com

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags fraudcybercrimemalwarelegalantivirusCriminalExploits / vulnerabilitiesZeus TrackerThe Shadowserver Foundation

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments


Brother MFC-L3745CDW Colour Laser Multifunction

Learn more >



Sony WH-1000XM4 Wireless Noise Cancelling Headphones

Learn more >


Back To Business Guide

Click for more ›

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?