On the heels of Robert Lemos’ report last week about source code and a manual for the Zeus crimeware framework spilling out for public consumption, M86 Security Labs is weighing in with its own findings.In an update sent to me yesterday by M86 press spokesperson Jan Wiedrick-Kozlowski, M86 researchers suggested the bad guys are following a channel distribution model to get more bang — and bucks — for their handiwork.From the findings: While some observers believe that the “leaking” of the code means that cybercriminals face the same IP protection challenges as traditional software developers, M86 Security Labs researchers suggest that the release of ZeuS freeware demonstrates that cyber criminals are adopting traditional channel distribution models in order to increase the profits from their malware.Bradley Anstis, VP Technical Strategy at M86 Security comments, “The ZeuS creators could be trying to shake up the market by giving away the tool kit, so that they can make their money from subsequent “WebInject” projects. Their aim could be to create a distribution channel so that they make more revenue through creating additional modules for the crimeware than they did from selling the application itself. If this is the case, then this is the first example of a “Crimeware Freemium Model” that we have seen.”In August 2010, M86 Security Labs reported that ZeuS had been used to steal almost a million dollars from UK bank accounts. In October 2010, the ZeuS creator provided source code to the developer of competing banking malware, Spy-Eye, resulting in more powerful Trojans. The release of ZeuS source code free of charge to the broader criminal network could help to establish ZeuS as the de-facto crimeware and lead to more potent banking malware variants warns M86 Security.Sign up today.Get your morning news fix with the daily Salted Hash e-newsletter! The news is hardly surprising, but it does shed a little more light into the business model being developed by the bad guys.–Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe