A combination of the Zeus and SpyEye banking malware programs is taking shape, researchers say A dangerous piece of malicious code responsible for stealing money from online bank accounts is being updated with new functions after its source code was leaked earlier this year, according to security researchers.The Zeus malware has been a significant issue for banks. It is capable of intercepting login credentials in real-time on an infected computer and carrying out immediate transactions. Zeus is also frequently undetected by antivirus software.Zeus is still used by cybercriminals, but it is believed active development on it has stopped. Its source code was leaked in March, and security researchers noticed that many of its functions were incorporated into a similar type of malware called SpyEye, a merger that has incrementally continued over the last few months.The improvements are relatively minor at this point, such as tweaks to ensure that SpyEye evades security software programs, said Aviv Raff, CTO and cofounder of Seculert. Another small improvement is that SpyEye’s developers have made it harder for security researchers to track its command-and-control servers hosting the malware’s configuration files. Servers hosting those configuration files — which send instructions to computers infected with SpyEye — could be tracked and monitored, but that has become more difficult with the version of SpyEye studied by Raff.“They hide the configuration file of the malware behind a script which requires a specific key to download,” Raff said in an interview over instant messenger. “The current tracker will need to know the key which the malware uses in order to download and analyze the malware configuration file.” That could pose problems for projects such as the Zeus and SpyEye trackers, which monitor live command-and-control servers for the programs.There are many botnets that use the Zeus and SpyEye code. This latest one with the improvements is dubbed “Ice IX.” The code needed to run the botnet is selling for around US$1,800, a competitive price, wrote Jorge Mieres, a malware analyst with Kaspersky Lab. SpyEye has been sold for as much as $10,000 in the past.“It is clear that from now on, more new crimeware will be based on Zeus code,” Mieres wrote on a Kaspersky blog. “New developers, hoping to profit from cybercrime, will attempt to create their own new alternatives based on this source.”Raff concurs with the prediction. “Unfortunately, I believe that we will see other cybercriminals take the source code of Zeus and add more harmful features,” he said.Earlier this month, a French security researcher who goes by the name Xylitol found a way to defeat a mechanism that prevented people who had not paid for SpyEye from using it. SpyEye uses VMProtect to lock an installation of the software program to a particular physical device, wrote Sean Bodmer, senior threat intelligence analyst, with the security company Damballa.Xylitol’s work helps security researchers since it opens up more information on how SpyEye is coded, which may help when developing defenses against it. Bodmer wrote. Send news tips and comments to jeremy_kirk@idg.com Related content news analysis LogoFAIL attack can inject malware in the firmware of many computers Researchers have shown how attackers can deliver malicious code into the UEFI of many PCs though BIOS splash screen graphics. By Lucian Constantin Dec 08, 2023 8 mins Malware Malware Cybercrime news Google expands minimum security guidelines for third-party vendors Google's updated Minimum Viable Secure Product (MVSP) program offers advice for working with researchers and warns against vendors charging extra for basic security features. By John P. Mello Jr. Dec 08, 2023 4 mins Application Security Supply Chain news New CISO appointments 2023 Keep up with news of CSO, CISO, and other senior security executive appointments. By CSO Staff Dec 08, 2023 28 mins CSO and CISO CSO and CISO CSO and CISO news Top cybersecurity product news of the week New product and service announcements from Coro, Descope, Genetec, Varonis, Cloudbrink, Databarracks, and Security Journey By CSO staff Dec 07, 2023 22 mins Generative AI Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe