"How the ZeuS Trojan Info Stealer Changed Cybersecurity"

After infecting a computer or device, information-stealing malware is highly adept at exfiltrating login credentials, financial information, and other confidential data. Typically, information stealers operate by capturing keystrokes, screenshots, and network traffic. They may also search a hard drive for certain data types. The data is then sent to the attacker's command-and-control (C2) server for further exploitation. On underground criminal networks, information-stealing malware has thrived. Information stealer services for financial fraud attacks are available for as little as $200 per month on the dark web. Although this category of malware has existed in some form for more than two decades, the ZeuS Trojan has been the most influential as an information stealer. ZeuS was the first true information stealer used in an attack with the intent to harvest data. ZeuS became one of the most prevalent information stealers ever. The malware's primary objective was to steal online banking credentials. To steal sensitive information from infected computers, ZeuS used various methods, including keylogging and form grabbing. The information was then used to conduct unauthorized transfers from the victims' bank accounts to the attackers' accounts. In addition, the malware could identify when a user visited certain websites, especially those related to banking. ZeuS affected Android, Symbian, and Blackberry mobile devices. It is considered the first malware to steal Mobile Transaction Authentication Numbers (mTANs), a form of two-factor authentication (2FA) banks use during transactions. This article continues to discuss the ZeuS Trojan and other information stealers.

Security Intelligence reports "How the ZeuS Trojan Info Stealer Changed Cybersecurity"

Submitted by Anonymous on