Kaspersky Lab finds new version of infamous banking malware making the rounds A 64-bit version of the notorious Zeus family of banking malware has been found, an indication that cybercriminals are preparing for the software industry’s move away from older 32-bit architectures. [Credit report breach has link to Zeus banking malware]Kaspersky Lab discovered the 64-bit version of Zeus within a 32-bit sample. A code analysis indicates the malware has been circulating the Internet at least since June. The discovery is considered a milestone because the popularity of Zeus and its variants indicates that 64-bit development in the underground has become mainstream, Kurt Baumgartner, principal security researcher for Kaspersky, said. This means the security industry now has a “certain and real 64-bit problem.” “Researchers and the security community have long anticipated that more and more 64-bit malware would arrive on the scene, and here is one of the most used, most problematic pieces of spyware taking on that challenge,” Baumgartner told CSOonline. To ensure the effectiveness of their creations, cybercriminals typically follow software development trends. After all, the best way to hack into a 64-bit application is with malware built on the same architecture. So while the move to 64-bits was expected to happen eventually, Kaspersky was surprised to see the beefier version of Zeus so soon. That’s because there’s no apparent need for such a version yet. Zeus often does its dirty work through the Web browser, and most browsers in use today are 32-bit. For example, Kaspersky pegs the share of users browsing with 64-bit Internet Explorer (IE) at less than 0.01 percent. IE accounts for more than half of the browser market, according to Net Applications. Even if the browser is on a 64-bit operating system, Zeus can still capture data related to online banking and wire transactions, such as user names, passwords and cookies. The malware also can modify data to cover its tracks. Kaspersky speculates that the new Zeus malware may be a “marketing gimmick.” “Support for 64-bit browsers (is) a great way to advertise the product and to lure buyers — the botnet herders.” Kaspersky Lab expert Dmitry Tarakanov said in a blog post Wednesday. [Researchers warn of increased Zeus malware activity this year]The latest version of Zeus uses the Tor anonymity network to communicate with the command-and-control server. Some 32-bit versions have had this capability as an option, but the new malware makes Tor communications an inseparable functionality. “Zeus malware has the ability to work on its own via the Tor network with onion C&C domains, meaning it now joins an exclusive group of malware families with this capability,” Tarakanov said. The way the sample works is the 32-bit version first tries to inject malicious code into the browser. If the latter is 64-bit, then Zeus switches to that architecture. Zeus set the standard for other banking malware. For example, its capabilities for injecting code in browsers have become a fundamental must-have feature in nearly every banking malware family, Kaspersky says. In May, security researchers at antivirus vendor Trend Micro reported seeing a significant increase in the use of Zeus, one of the oldest families of financial malware. Also called Zbot, Zeus is no longer developed by its original creator. In 2011, Zeus source code was leaked on the Internet, resulting in a surge of customized versions. Among the more popular Zeus-based Trojan programs are Citadel and GameOver. Related content feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Intrusion Detection Software Intrusion Detection Software feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe