Banking Trojan ZeuS and ABE
Posted: Mon Jun 21, 2010 5:03 pm
The latest version of the Zeus botnet involves a banking Trojan with a Firefox forms capture capability. Antivirus programs are largely ineffective at blocking infection and less than 50% of ZeuS infections are even detected after they occur. Infection can occur in user accounts without administrative privileges and on the current Windows 7 64-bit machines now on the market, virtualization to kill such infections is not possible. When actively exploited zero-days occur, even those with software fully up-to-date are left wide-open to infection. There are nonetheless plenty of ways to avoid visiting dangerous URL’s and thereby likely avoid most infection vectors.
What may not be so well controlled are blockage of IP address sources of the Zeus Trojan that lack a URL, so as to defeat URL blocking methods.
To help prevent further bank account online thefts, ABE could coordinate with those fighting ZeuS to provide to NoScript users a list of the 50 or so IP addresses without URLs serving the ZeuS Trojan at any given time.
https://zeustracker.abuse.ch/
PS If the ZeuS Tracker data is good enough for Arbor Networks to use, it certainly should be of a quality sufficient for NoScript users. http://www.abuse.ch/?p=2568
What may not be so well controlled are blockage of IP address sources of the Zeus Trojan that lack a URL, so as to defeat URL blocking methods.
To help prevent further bank account online thefts, ABE could coordinate with those fighting ZeuS to provide to NoScript users a list of the 50 or so IP addresses without URLs serving the ZeuS Trojan at any given time.
https://zeustracker.abuse.ch/
PS If the ZeuS Tracker data is good enough for Arbor Networks to use, it certainly should be of a quality sufficient for NoScript users. http://www.abuse.ch/?p=2568