GameOver Zeus

Description

(US-CERT) GOZ, which is often propagated through spam and phishing messages, is primarily used by cybercriminals to harvest banking information, such as login credentials, from a victim’s computer. Infected systems can also be used to engage in other malicious activities, such as sending spam or participating in distributed denial-of-service (DDoS) attacks.

Prior variants of the Zeus malware utilized a centralized command and control (C2) botnet infrastructure to execute commands. Centralized C2 servers are routinely tracked and blocked by the security community. GOZ, however, utilizes a P2P network of infected hosts to communicate and distribute data, and employs encryption to evade detection. These peers act as a massive proxy network that is used to propagate binary updates, distribute configuration files, and to send stolen data. Without a single point of failure, the resiliency of GOZ’s P2P infrastructure makes takedown efforts more difficult.

Names

Name
GameOver Zeus
Peer-to-Peer Zeus
P2P Zeus
GOZ

Category

Malware

Type

  • Banking trojan
  • Info stealer
  • Credential stealer
  • Downloader
  • Botnet

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

f120d94b-15cc-4290-b899-724a4f1c2af4

Last Card Change

2021-04-24