Suspects charged with stealing more than $9.4 million from U.K. banks using the Zeus botnet apparently spent more time figuring out the logistics of stealing the money than they did on securing their cyber operation. Suspects charged with stealing more than $9.4 million from U.K. banks using the Zeus botnet apparently spent more time figuring out the logistics of stealing the money than they did on securing their cyber operation.ZeuS botnet has a new use: Stealing bank access codes via SMSSo says the head of an online-security services provider for banks whose software tracks the activity of malware in bank customers’ computers.Criminal groups using Zeus commonly leave their command and control servers traceable and make use of servers in the same geographical area where they carry out theft, says Mickey Boodaei, CEO of browser security vendor Trusteer. “They are not doing the best job of covering their tracks,” Boodaei says. “Their own security is not at the top of their minds right now. They’re focused on the operational side of getting money out of the banks.”Also see the interactive ‘What a botnet looks like’ Police in the U.K. have arrested 19 people on charges they used the Zeus trojan to break into customer accounts and steal funds by transferring it to other accounts held by accomplices who then delivered it to the masterminds via untraceable means like Western Union, he says.Boodaei says his company has been tracking several groups using Zeus to steal money from online accounts and has no way of knowing whether the intelligence it gathered was used in the investigation that led to the recent U.K. arrests. His firm works for the banks and shares the intelligence with them, and they may or may not pass it along to police.Trusteer has captured the malware used in the crime and managed to figure out the transactions it was designed to carry out. In some cases Trusteer has managed to find the command and control servers used to run the operation, the company claims.In general, Zeus is available online and has tools for customizing it and building new versions to bypass specific security controls and adapt to changes banks implement to shore up their online services, Boodaei says.“There are probably dozens of criminal groups that license Zeus,” he says. “They’re all separate, each has its own configuration. Some are focused on just a couple of banks.” Their customized Zeus malware is tuned to attack specific banks.Once investigators track down the command and control servers, they can follow transactions to the server and so trace the criminals, Boodaei says. “You don’t use servers in the same territory where you’re operating,” he says.Similarly, investigators can trace the accounts set up by the money mules – the people whose accounts receive the stolen funds then transfer them to the criminals. Once they are found, investigators can trace how they were recruited and perhaps by whom, he says.Read more about wide area network in Network World’s Wide Area Network section. Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe