Seculert Finds Fresh Malware Combining Zeus And SpyEye
Security Company Seculert Research Labs has declared some days back that its security investigators have discovered the Hydra malware in a fresh edition that combines both the Zeus and SpyEye Trojans' source codes to make one fresh threat, which's hard to spot as well as similar to Zeus, captures banking details from unwitting PC operators.
It was speculated that the Zeus/SpyEye combination was being developed starting October 2010. At that time, an extreme competition among the developers of the illegitimate program as well as those who backed the malware was seen as subsiding, while many hacker forums stated that Zeus' creator a Russian national had taken the decision for quitting the business while handing over the source code of his Trojan to the SpyEye's writer.
Soon after that, the SpyEye author known to have two names - Gribodemon and Harderman according to different hacker forums, told security researchers in an interview regarding merging the twin Trojans as well as selling the just created hybrid's licenses in the cyber-crime market.
However, there weren't any indications of the hybrid malware until recently when the updated PC Trojan's traces have begun appearing. And as these notorious toolkits for creating malware evolve, there are some which are pursuing online miscreants that summons companies and banks for improving their security alongside, for, despite the fresh toolkit being currently used quite minimally, it's not going to be long when increasing number of cyber crooks will buy the destructive tool.
Stated Principal Research Analyst Alex Cox at NetWitness a network-security company, the entire thing was regarding perceiving the manner in which one's network worked like what type and volume of traffic was passing via his system. Previously, detection was always basically signature-based, wherein the method was of spotting a known strain within the malware while identifying the same program via hunting for the particular signature. However, con artists had become too skilled and they were getting around those systems that detected malware through signature-based techniques. Presently, attempts were at shifting to detection that was increasingly behavior-based, Cox indicated. Foxnews.com published the research analyst's statement on February 4, 2011.
» SPAMfighter News - 12-02-2011