Gameover gang uses Cutwail botnet to swell its own
Posted on 06.12.2012
The hackers behind the Gameover variant of the popular Zeus banking Trojan have rented the massive Cutwail botnet in order to send out millions of fake emails carrying the malware, warns Dell SecureWorks’ Counter Threat Unit.

The emails have been made to look like they were sent by one of many big U.S. banks, and try to trick unsuspecting users into thinking that the banks have begun using a secure way to exchange emails containing personal information:

The attached carris a downloader that, once executed, installs the Gameover malware. And in order to make sure that it immediately gets to steal relevant login data, the email says that "first time users will need to register after opening the attachment."

According to Brett Stone-Gross, a senior security researcher with Dell SecureWorks, the campaign has already resulted in more than half a million infections.

These infected computers are then enslaved in a big peer-to-peer botnet with DDoS capabilities that are often used to mount attacks against banks in order to divert their attention from the money-stealing in progress.

Unfortunately, such a botnet is difficult to dismantle as there is no central C&C server that can be taken down and leave the bots orphaned - bots communicate with and receive configuration files from each other.


Email scammers stole $215M from businesses in 14 months

Posted on 29 January 2015.  |  In 14 months there have been nearly 1200 US and a little over 900 non-US victims of BEC scams, and the total money loss reached nearly $215 million.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Jan 30th