Gameover ZeuS now targets users of employment websites
Posted on 25.03.2014
Some newer variants of the Gameover Zeus Trojan, which is exceptionally good at using complex web injections to perform Man-in-the-Browser (MITB) attacks and gain additional information about the victims to be used for bypassing multi-factor authentication mechanisms and effecting social engineering attacks, has been spotted targeting users of popular employment websites.

They initially focused on CareerBuilder.com (largest employment website in the US), but now also on Monster.com (one of the largest in the world).

The fake login page victims are served with looks virtually identical to the legitimate one, but the next one is web form injected by the malware:


There are 18 different questions to choose from, and they range from the name of the city where your sibling lives/you got your first job/you met your spouse, to the name of your school(s)/friend/work supervisor and significant dates and numbers in your life.

F-Secure researchers warn HR recruiters with website accounts to be on the lookout for any such irregularities.

"If the account is potentially tied to a bank account and a spending budget Ö it's a target for banking trojans," they point out.









Spotlight

Crowdsourcing your bug bounty program

David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //