'Gameover Zeus' Gang Launches New Attacks

Campaign includes rigged emails spoofing major U.S. banks and offering 'secure email' exchange with banking customers

Dark Reading logo in a gray background | Dark Reading

The cybercrime group behind the Gameover Zeus Trojan that steals online banking creds and credit card numbers is waging a massive malicious email campaign that enlists the massive Cutwail spamming botnet to blast its emails.

Millions of emails -- many of which pose as coming from major U.S. banks -- have been spammed out in recent weeks, according to Dell SecureWorks' Counter Threat Unit. The phony but convincing-looking emails appeal to a more security-minded banking customer: "You have received a new encrypted message or a secure message from [XYZ] Bank," one of the email campaigns says, noting that the bank has set up a secure email exchange for its customers as a way to allay privacy and security concerns.

The message includes an infected attachment that the "bank" requires for download and registration to the supposed secure email system. Once downloaded, it executes the pony downloader Trojan that installs Gameover and steals online banking credentials, credit card account numbers, and other information.

Another email campaign claims the recipient has received a fax, scan, or voicemail, and includes a "free program" for retrieving the message -- but, of course, the attachment installs the malware.

The Gameover gang, unlike some cybercrime groups, doesn't lease or sell its malware or services. It's a closed operation that, instead, sometimes contracts resources such as the Cutwail botnet to transport its attacks. More than half of the Top 20 Fortune 500 firms were infected with the Trojan as of this summer, according to SecureWorks, which in July published a report on Gameover

"This particular group has found a combination of malware, tactics, and procedures that leads to success for them. They will continue to follow the same process [of working this way]," says Jon Ramsey, CTO of Dell SecureWorks. "The malware they use is a private version of theirs, and they don't sell it on the black market. They feel there's more of an upside financially in keeping it private."

Ramsey says the gang has had plenty of success creating large botnets for both sending more malicious spam and conducting distributed denial-of-service attacks. They're using a dual-botnet sort of model with Cutwail transporting the spam, and subsequently infected Gameover bots spreading their infections and doing the Gameover botnet operators' bidding.

About 678,205 machines were infected with Gameover Zeus in August, according to SecureWorks, and it's the biggest botnet targeting financial institutions today. Fourteen of the 20 top Fortune 500 firms are infected, including financial services firms, defense contractors, government agencies, law enforcement, military, and universities.

The peer-to-peer Gameover botnet was structured to deter disruption and to make attribution more difficult. Even so, peer-to-peer botnets are easier to "poison" by using phony peers that allow researchers to sinkhole traffic, according to Brett Stone-Gross, who has closely studied Gameover.

"The P2P ZeuS crew receives considerable support from the products and services offered by the underground community, who collectively fulfill vital functions to plan and execute a large successful cybercriminal operation. Moreover, the large number of compromised personal computers and web servers provide a robust and low cost infrastructure for a variety of malicious activities," Stone-Gross wrote in his report.

[Trade-offs are a fact of life for network defenders, but attackers have to abide them as well. See The Attacker's Trade-Off: Stealth Versus Resilience.]

Cutwail, one of the world's largest botnets, to date contains around 500,000 or so bots, according to SecureWorks data.

Researchers at LookingGlass Cyber Solutions say the top 10 countries infected by the Cutwail botnet, in order, are: India, Iran, China, Vietnam, Ukraine, Kazakhstan, Belarus, the U.S., South Korea, and Brazil.

"We saw 43,332 unique hosts infected with Cutwail on December 3, 2012," says Jason Lewis, chief scientist with LookingGlass. Overall, the researchers saw some 203,117 bots sending spam -- from botnets including Cutwail, Asprox, Festi, and Kelihos.

"About 3,000 hosts had multiple infections," Lewis says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights