07-14-2014 09:45 PM
The Gameover ZeuS malware is back from the dead just six weeks after a takedown operations that aimed to put a stake through the heart of the botnet, which is linked to the even more infamous CryptoLocker ransomware.
International law enforcement acted against the crooks behind the Gameover ZeuS in early June. For the past month, the botnet formed by this malware was largely inactive, according to net security firm Sophos.
GameOver ZeuS, which is estimated to have infected more than 500,000 machines worldwide, is designed to steal financial and personal information from compromised PCs. Gameover ZeuS was a common distribution mechanism for CryptoLocker prior to June's takedown op. Cybercrooks behind the latest variant appear to have regressed to using older tricks involving infected email attachments and spam.
Now a new variant of Gameover ZeuS is being used to establish a zombie network. Sophos reports that the new variant is distributed through widespread spam campaigns, meaning the number of infections may already be large. Dodgy messages pose as online bank account statements, it said. The attachments of these messages are actually riddled with malware.
Helpful Webroot Links: