February 3, 2011 By Amit Klein 3 min read

Despite having been around for several years, Zeus continues to be a thorn in the side of the IT security industry and its business users mainly because of its constantly-evolving profile. The ease with which black hat hackers can develop the malware for new and varied applications partially drives this evolving profile.

Our ongoing research here at IBM confirms the evolution of Zeus, with a growing number of websites that host Zeus variants as well as the rising volume of networks hosting command-and-control (C&C) servers for the Zeus botnet swarms. Over the last four months, IBM’s research teams have been analyzing the geographical IP distribution of sites hosting Zeus configurations.

The Geographical Breakdown of Zeus

Our research shows that the United States (39.8 percent), Russia (21.6 percent) and Ukraine (6.5 percent) were the top three host countries, with Eastern Europe accounting for 32 percent of Zeus configs. That doesn’t mean other countries are off the hook: China, Malaysia, Iraq and Canada, along with Germany, the United Kingdom and the Netherlands, are also responsible for websites with hosted Zeus environments.

Our research team has also analyzed which organizations/service providers have the dubious distinction of ranking high in the Zeus C&C site stakes. Analyzing 20 of the organizations that account for over half of the C&C controllers reveals that five of the 20 service providers — Informex, PAN-SAM Ltd., LLC Management and Information, S.Point and Delta-X LTD — are on the Ukrainian networks, responsible for 16 percent of Zeus C&C servers.

Another five service providers are on the U.S. networks and responsible for 14 percent of Zeus C&C systems, with GoDaddy.com accounting for a hefty 5 percent of American Zeus C&C sites. Based on this research, our analysts tested the accessibility of sites used as a Zeus C&C platform.

The analysis of IP-accessible sites over the last 80 days makes for some interesting reading: 29 percent were found to be U.S. Websites, with Ukraine (17 percent) and Russia (14 percent) once again joining the United States in the Zeus hall of shame. Delving into the research reveals some surprising data. For instance, the United Kingdom accounts for 6 percent, and the rising technology nation of Poland account for 5 percent of IP-accessible C&C systems. Equally surprising was the inclusion of Bosnia and Herzegovina on the charts with 3 percent — no mean feat for a country of just 3.8 million people.

Putting the IT Security Industry on Notice

More than anything, these detailed statistics show that the global Internet is becoming highly diversified very quickly, but the increasing usage of automated registration and servicing systems on the Internet means that human operator monitoring of hosted systems has become less frequent in those countries with good Internet access. While it drives the cost of hosting downward, the lack of monitoring makes it all too easy to register and set up a C&C and/or Zeus-infected website plus allied systems and use the platform to infect the general Internet-user community. IBM will continue to monitor and report the continuing evolution of Zeus and its many variant infections, detailing the results for our many friends in the IT security industry.

Thanks to Tanya Shafir from the IBM Security Trusteer research team for providing the data for this post.

More from Fraud Protection

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today