Gameover gang uses Cutwail botnet to swell its own
Posted on 06.12.2012
The hackers behind the Gameover variant of the popular Zeus banking Trojan have rented the massive Cutwail botnet in order to send out millions of fake emails carrying the malware, warns Dell SecureWorks’ Counter Threat Unit.

The emails have been made to look like they were sent by one of many big U.S. banks, and try to trick unsuspecting users into thinking that the banks have begun using a secure way to exchange emails containing personal information:

The attached carris a downloader that, once executed, installs the Gameover malware. And in order to make sure that it immediately gets to steal relevant login data, the email says that "first time users will need to register after opening the attachment."

According to Brett Stone-Gross, a senior security researcher with Dell SecureWorks, the campaign has already resulted in more than half a million infections.

These infected computers are then enslaved in a big peer-to-peer botnet with DDoS capabilities that are often used to mount attacks against banks in order to divert their attention from the money-stealing in progress.

Unfortunately, such a botnet is difficult to dismantle as there is no central C&C server that can be taken down and leave the bots orphaned - bots communicate with and receive configuration files from each other.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th