Botnet smashed: At Zloader, it's out of the question

Botnet smashed: At Zloader, it's out of the question

Share post

Coordinated strike against global botnet succeeded: In a joint action with Microsoft, Lumen Black Lotus Labs and Palo Alto Networks, ESET has succeeded in deactivating the global botnet Zloader.

The aim was to paralyze the infrastructure and massively restrict the group's activities. The eCrime group behind it was initially extremely active in the area of ​​banking fraud and password theft in recent years. Later, the perpetrators expanded their portfolio and offered Zloader on underground forums as "Malware as a Service". The underlying malware of the same name was originally developed as a banking Trojan based on the source code of the Zeus malware leaked in 2021. ESET had identified and analyzed more than 2019 different malicious code samples since 14.000.

Three-stage campaign with resounding success

The coordinated action targeted three specific botnets, each using a different version of the Zloader malware. ESET researchers identified more than 250 domains used since January 1, 2021 by the operators that were successfully acquired as part of the promotion. In addition, the backup communication channel was turned off, which automatically generates new domain names, with the help of which the botmasters could again send commands to the Zloader bots (zombies). This technique, known as "Domain Generation Algorithm" (DGA), is used to generate up to 32 different domains per day per botnet. The domains have been identified and already registered by the Anti-Zloader Task Force to ensure that the botnet operators cannot use this side channel to regain control of the zombie network.

Malware as a Service as a distribution model

Zloader was advertised as commodity malware on underground forums. The potential perpetrators do not need to have any programming knowledge here, but can fall back on a complete eCrime service package. In addition to the malicious code, this also includes services and advertising measures to attack and infect computers. The buyers receive the complete infrastructure for rolling out the malicious programs and for setting up and controlling their own botnet.

Zloader malware background

The first version of Zloader (V.1.0.0.0) discovered by ESET - then announced and promoted in underground forums as "Silent Night" - dates back to November 09, 2019 and was based on the leaked program code of the Zeus banking Trojan. The spread took place, among other things, via spam mails with manipulated Office files on the subject of Covid-19. The various eCrime groups then use RIG exploit kits, spam emails with fake invoices (XLS macros) and Google Ads campaigns to lure potential victims to manipulated websites with infected downloads. The use of exploit kits is worthwhile for spreading malicious code, since these tools, which are traded in eCrime forums, can be used to search for exploitable vulnerabilities in computer programs in a targeted and automated manner.

More at ESET.com

 


About ESET

ESET is a European company with headquarters in Bratislava (Slovakia). ESET has been developing award-winning security software since 1987 that has already helped over 100 million users enjoy secure technology. The broad portfolio of security products covers all common platforms and offers companies and consumers worldwide the perfect balance between performance and proactive protection. The company has a global sales network in over 180 countries and branches in Jena, San Diego, Singapore and Buenos Aires. For more information, visit www.eset.de or follow us on LinkedIn, Facebook and Twitter.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more