After a hit-and-run campaign against consumer online bank accounts in 2010, the Zeus Trojan now appears to be aggressively targeting a clutch of second-tier money exchange and payment services. After a hit-and-run campaign against consumer online bank accounts in 2010, the Zeus Trojan now appears to be aggressively targeting a clutch of second-tier money exchange and payment services.According to Israeli company Trusteer, which specialises in tracking the activities of Zeus and its variants, there are now at least 26 different configurations to attack one company alone, Money Bookers.Each configuration represents a separate set of slightly different instructions on how to attack the sites associated with a brand, with the number detected being similar in scale to the number of configurations that would be created to attack much larger companies.One thing that becomes clear is that along with the other services attacked – Web Money and Nochex, netSpend – this Zeus campaign is second-tier nature of these companies. Perhaps fearing attention, on this evidence the criminals are steering clear of large consumer payment services such as PayPal. Ironically, the criminals have also gone after a service called e-gold, which several years ago was itself accused of being a conduit for money laundering. Configurations used against the site are sophisticated enough to try and trick the site into sending it an alternate password to access an account. “We believe this trend of targeting online payment providers will continue as more retailers allow these alternate payment methods with their Web sites,” said Trusteer.What Trusteer hasn’t been able to document is whether the attacks it has detected have been successful. If the pattern of attacks through 2009 and 2010 on consumers is any guide, knowledge of that dimension tends to come later as victims emerge. Related content news UK CSO 30 Awards 2023 winners announced By Romy Tuin Dec 05, 2023 4 mins CSO and CISO news analysis Deepfakes emerge as a top security threat ahead of the 2024 US election As the US enters a critical election year, AI-generated threats, particularly deepfakes, are emerging as a top security issue, with no reliable tools yet in place to combat them. By Cynthia Brumfield Dec 05, 2023 7 mins Election Hacking Government Security Practices feature How cybersecurity teams should prepare for geopolitical crisis spillover CISOs can anticipate and prepare for cyberattacks conducted by participants in geopolitical conflict such as the Israel/Hamas war by understanding the threat actors' motivations and goals. By Christopher Whyte Dec 05, 2023 12 mins Advanced Persistent Threats Threat and Vulnerability Management Risk Management news analysis P2Pinfect Redis worm targets IoT with version for MIPS devices New versions of the worm include some novel approaches to infecting routers and internet-of-things devices, according to a report by Cado Security. By Lucian Constantin Dec 04, 2023 5 mins Botnets Hacker Groups Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe