680 likes | 697 Views
ZeuS : God of All Cyber-Theft. Roland Dela Paz and Jasper Manuel Threat Researchers. Greek Mythology. 2. Classification 11/7/2019. Virtual Landscape. 3. Classification 11/7/2019. Commercial crimeware for stealing online banking credentials Authored by “Slavik”/“Monstr”
E N D
ZeuS: God of All Cyber-Theft Roland Dela Paz and Jasper Manuel Threat Researchers
Greek Mythology 2 Classification 11/7/2019
Virtual Landscape 3 Classification 11/7/2019
Commercial crimeware for stealing online banking credentials Authored by “Slavik”/“Monstr” Has been in the wild since late 2005 Fast Facts on ZeuS
The ZeuS Infection Chain via spammed messages
The ZeuS Infection Chain via spammed messages via malicious websites
ZeuS is configured to target a list of bank-related websites or financial institutions from which they try to steal sensitive online banking information ZeuS: The How
ZeuS Builder Web Panel Configuration Files ZeuS Toolkit Components
Zeus Builder ZeuS Toolkit Components
Web Panel ZeuS Toolkit Components
Web Panel ZeuS Toolkit Components
Configuration Files ZeuS Toolkit Components Config.txt: Webinjects.txt:
Configuration Files ZeuS Toolkit Components Config.txt: Webinjects.txt:
Configuration Files ZeuS Toolkit Components Config.txt: Webinjects.txt:
Configuration Files ZeuS Toolkit Components Config.txt: Webinjects.txt:
Gathering Intelligence Downloaded configuration file
Gathering Intelligence Downloaded configuration file
Gathering Intelligence Breaking the encryption Where is the decryption key???
Gathering Intelligence Breaking the encryption ZeuS 1.x encryption algorithm
Gathering Intelligence Breaking the encryption Finding the key stream
Gathering Intelligence Breaking the encryption Encryption key in config.txt
Gathering Intelligence Breaking the encryption RC4 function used by ZeuS
Gathering Intelligence Breaking the encryption ZeuS builder - key stream generation
Gathering Intelligence Breaking the encryption ZeuS 2.x encryption algorithm
Gathering Intelligence Breaking the encryption Finding the key stream
Gathering Intelligence Breaking the encryption Finding the key stream
Gathering Intelligence Breaking the encryption Finding the key stream
Gathering Intelligence Breaking the encryption Encrypted HTTP traffic
Gathering Intelligence ZeuS POST data decryption Decryption key in ZeuS CP
Gathering Intelligence ZeuS POST data decryption
Gathering Intelligence ZeuS POST data decryption
Use to source and monitor ZeuS binaries for detection, malware development, and solution creation Use to source and monitor malicious ZeuS domains for blocking Share with law enforcement agencies to help in investigations, arrests, C&C take-downs, etc. Use to identify target (financial) firms and country What to do with gathered intelligence?
Volume of customers Online security measures Availability of webinject scripts What makes financial firms attractive targets?
Internet population Online banking population Value of money Locality What makes a country/region an attractive target?