Menu DaniWeb
Log In Sign Up
  • Read
  • Contribute
  • Meet
  1. Home
  2. Hardware and Software Forum
  3. Information Security Forum
  4. News Stories
  5. News Story

Now Zeus 2 botnet adds client side cookie harvesting

14 Years Ago happygeek 0 Tallied Votes 498 Views Share

A new botnet has been discovered which is not only targeting users of UK banks, but doing so in a new and worrying manner. Said to comprise of in excess of 100,000 infected machines, the Zeus 2 botnet is operated and controlled from Eastern Europe according to secure browsing security provider Trusteer which went public with its discovery today.

Zeus botnets are sadly neither new or rare , however Amit Klein, Trusteer's Chief Technology Officer, reveals that this one is especially worrying as it doesn't just stop at harvesting user IDs and passwords but instead also looks for client side certificates and cookies. By doing this, Klein says "the cybercriminals can extract a lot of extra information on the user that can be used to augment their illegal access to those users' online accounts. Coupled with the ability to remotely control users' machines, download data and run any file on them, this means that the fraudsters can insert partial or complete Internet pages into a live Web session, enabling to inject transactions at will or extract even more data from the hapless victims".

Indeed, according to the Trusteer investigation it would seem that this particualr Zeus 2 botnet is harvesting anything and everything it can get its hands on, including: online account IDs, bank login information, credit and debit card numbers, account types and balances, bank statements, browser cookies, client side certificates, login information for email accounts and social networks, oh and not forgetting FTP passwords.

Trusteer was able to gain access to the botnet's drop servers and command and control center containing the stolen information which included hundreds of thousands of stolen credentials which effectively give the bad guys direct yet hidden access to the online financial activities of the compromised users.

Trusteer researchers also gained access to the management interface, allowing them to get a unique view into the methods used by the bad guys to control a Zeus botnet operation. The management interface itself can be thought of as enabling three main areas of functionality: the ability to monitor the growth and footprint of the botnet complete with detailed statistics and graphs, a search function on all traffic generated by the bots compiled by capturing all HTTP and HTTPS traffic from infected computers which is then stored in a central MySQL database, and finally a push update feature to send updated executables to specific bots.

Mickey Boodaei, Trusteer's CEO, says that the revelations surrounding the Zeus 2 botnet are the result of hundreds of man hours of effort behind the scenes by his security team, who constantly monitor for this type of activity. "Zeus has become one of the most prevalent botnet trojans in the history of online fraud" Boodaei said.

cybersecurity finance windows-virus
zeus.jpg 16.87 KB
About the Author
Member Avatar for happygeek
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

A freelance technology journalist for 30 years, I have been a Contributing Editor at PC Pro (one of the best selling computer magazines in the UK) for most of them. As well as currently contributing to Forbes.com, The Times and Sunday Times via Raconteur…

Member Avatar for kp52
kp52 0 Newbie Poster
14 Years Ago

Useful to know this threat exists, but even more useful would be: what can we do to avoid it?

Member Avatar for Voidz
Voidz 0 Newbie Poster
14 Years Ago

Botnet's suck. I have one on my computer right now. Gotta reinstall Windows.

Reply to this topic
Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.

Sign Up — It's Free!
Related Topics
  • Member Avatar Zeus (Kneber) Botnet Infection is bad for business 0
  • Member Avatar DDoS for sale 0
  • Member Avatar Error message when i'm on MSN Live 12
  • Member Avatar OMG! Gumblar gets busy 0
  • Member Avatar Malware,virus,spyware help ?????no clue 5
  • Member Avatar Security costs to rise this year 0
  • Member Avatar IF YOU WANT FASTER HELP, READ THIS. 1
  • Member Avatar Can there be a safer Internet without better security? 0
  • Member Avatar Windows Explorer Not Opening 2
  • Member Avatar Chinese Takeaway Hacker Website 0
  • Member Avatar Multiple virus infections (probably) 7
  • Member Avatar Why cracked encryption is a good thing 3
  • Member Avatar popups bombarding me 7
  • Member Avatar Guess the dumbass password 1
  • Member Avatar Can't update antivirus software 15
  • Member Avatar Windows virus 16
  • Member Avatar My highlighted stuff gets unhighlighted 7
  • Member Avatar Internet Security 2010 Virus, removed, now computer freezing 17
  • Member Avatar virus attacking dell computer 3
  • Member Avatar Virus/Spyware - Can't get rid of 13
Not what you need?

Reach out to all the awesome people in our information security community by starting your own topic. We equally welcome both specific questions as well as open-ended discussions.

Start New Topic
Topics Feed
Reply to this Topic
Edit Preview

Share Post

Insert Code Block

  • Forums
  • Forum Index
  • Hardware/Software
    • Recommended Topics
  • Programming
    • Recommended Topics
  • Digital Media
    • Recommended Topics
  • Community Center
    • Recommended Topics
  • Latest Content
  • Newest Topics
  • Latest Topics
  • Latest Posts
  • Latest Comments
  • Top Tags
  • Topics Feed
  • Social
  • Top Members
  • Meet People
  • Community Functions
  • DaniWeb Premium
  • Newsletter Archive
  • Markdown Syntax
  • Community Rules
  • Developer APIs
  • Connect API
  • Forum API Docs
  • Tools
  • SEO Backlink Checker
  • Legal
  • Terms of Service
  • Privacy Policy
  • FAQ
  • About Us
  • Advertise
  • Contact Us
© 2025 DaniWeb® LLC