Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Zeus Crimeware Kit Source Code Leaked

CmdrTaco posted more than 3 years ago | from the yeah-sorry-bout-that dept.

Security 121

Trailrunner7 writes "The source code to the infamous Zeus crimeware kit, which has been sold on underground forums for years, has been leaked and is now available for anyone to see if they know where to look. Security researchers over the weekend noticed that files appearing to contain the source code for the Zeus crimeware kit were starting to pop up on various forums frequented by attackers and cyber-criminals. The Zeus exploit kit is perhaps the most well-known kit of its kind right now, and has been used by a variety of attackers for numerous malware campaigns and targeted attacks."

Sorry! There are no comments related to the filter you selected.

This story is useless (3, Informative)

roman_mir (125474) | more than 3 years ago | (#36093056)

This story is useless without the actual source code attached to it.

Re:This story is useless (5, Informative)

Anonymous Coward | more than 3 years ago | (#36093100)

http://www.thehackernews.com/2011/05/finally-source-code-of-zeus-crimeware.html

You're welcome.

Re:This story is useless (2)

thijsh (910751) | more than 3 years ago | (#36093232)

Thank you very much! The RAR archive [krash.in] (9.2Mb, password 'zeus') contains the Zeus source code alright (almost 60 KLOC of C++ and PHP with 10 KLOC of Russian comments). Interesting to see how the different parts work, I hope someone does an English translation for all non-Russian-speaking security researchers...

PWS-Zbot.gen.ds trojan detected (5, Funny)

doperative (1958782) | more than 3 years ago | (#36093298)

Says "PWS-Zbot.gen.ds trojan detected" here ...

Re:PWS-Zbot.gen.ds trojan detected (3, Funny)

Anonymous Coward | more than 3 years ago | (#36093392)

Duh.

Re:PWS-Zbot.gen.ds trojan detected (0)

Anonymous Coward | more than 3 years ago | (#36093400)

And this is a surprise? It's source code for malware god dammit...

Re:PWS-Zbot.gen.ds trojan detected (2)

TypoNAM (695420) | more than 3 years ago | (#36093414)

Yep, clamwin reported this:

F:\zeus\ZeuS 2.0.8.9\output\builder\zsb.exe: Trojan.Spy.Zbot-142 FOUND
F:\zeus\ZeuS 2.0.8.9\output\client32.bin: Trojan.Spy.Zbot-142 FOUND


----------- SCAN SUMMARY -----------
Known viruses: 950447
Engine version: 0.97
Scanned directories: 49
Scanned files: 436
Infected files: 2

Data scanned: 36.92 MB
Data read: 34.83 MB (ratio 1.06:1)
Time: 15.219 sec (0 m 15 s)

So, basically the zeus.rar archive contains a few precompiled executables that I assume were created with the provided source code and antivirus vendors already have the signatures for it.

Re:PWS-Zbot.gen.ds trojan detected (1)

onepoint (301486) | more than 3 years ago | (#36094022)

Big deal, open the application in a sandbox, take a look at the log's. and as the poster above commented, most likely examples.

Re:PWS-Zbot.gen.ds trojan detected (0)

Anonymous Coward | more than 3 years ago | (#36097366)

Really? And trust the sandbox to catch everything/log it, and trust the exe not to have anything else in there?

I really don't know why people bother with all this MS-based virus-infected crap when they can run debian/ubuntu/mint and have 25000+ tested, verified apps from a trustworthy source.

Re:PWS-Zbot.gen.ds trojan detected (1)

SydShamino (547793) | more than 3 years ago | (#36095222)

Well, no reason to bother with an MD5 for this download; you know it's what it says it is...

Re:PWS-Zbot.gen.ds trojan detected (2)

snemarch (1086057) | more than 3 years ago | (#36093420)

+5 insightful. Or funny? Can't decide.

Re:PWS-Zbot.gen.ds trojan detected (0)

Anonymous Coward | more than 3 years ago | (#36093628)

This just in: RAR containing source code and precompiled binaries of well-known malware....contains that malware!

Re:This story is useless (0)

Anonymous Coward | more than 3 years ago | (#36094020)

Can I get a refund ?

Mod up (1)

DJLuc1d (1010987) | more than 3 years ago | (#36093458)

Wish I had mod points.... never when you need them.

Re:This story is useless (0)

Anonymous Coward | more than 3 years ago | (#36093282)

Useless? Its more than enough for governments to start allocating massive spending & resources to locking down the internet, imposing mandatory DPI and monitoring everything we do.

Re:This story is useless (0)

Anonymous Coward | more than 3 years ago | (#36093472)

In America the Department of Immigration and Customs will show up at your house and put a bullet in your head.

why? for downloading copyrighted material, and downloading something evil.

Re:This story is useless (0)

Anonymous Coward | more than 3 years ago | (#36094150)

https://twitter.com/#!/search/zeus%20source%20dropbox

I will admit ignorance (0)

Anonymous Coward | more than 3 years ago | (#36095784)

but I know pretty much nothing about the Zeus toolkit other than seeing slashdotters talk about how great and famous it is. I know that this is going to sound trollish, but wouldn't such a powerful piece of software normally have a wikipedia page at least? It has nothing...

Both good and bad news... (3, Insightful)

Manip (656104) | more than 3 years ago | (#36093094)

This news is good for the security researchers and anti-virus companies to a certain degree, but bad for the rest of us. Zeus is extremely well written and extendible. Now "everyone" has access to it.

The ironic part about charging people for access was that it kept the number of criminals with access to the world's best crimeware kit down, and now the floodgates have opened.

Re:Both good and bad news... (4, Funny)

x*yy*x (2058140) | more than 3 years ago | (#36093188)

But isn't open source a good thing? Now everyone can improve it and so on..

Re:Both good and bad news... (2, Funny)

Anonymous Coward | more than 3 years ago | (#36094380)

My company is on it...after a year through our processes, zeus will be so broken and useless no one will want to use it.

Re:Both good and bad news... (1)

JWSmythe (446288) | more than 3 years ago | (#36094776)

    Bob, I told you to stay off of Slashdot while you're suppose to be "working". We all know you don't do much of anything, but referencing your coworkers as incompetent slackers really doesn't make you any new friends.

    Now get back to work. You've been doing that "simple" change for 2 months now. Get it done with so we can present it to the customer.

Re:Both good and bad news... (1)

kpainter (901021) | more than 3 years ago | (#36095578)

My company is on it...after a year through our processes, zeus will be so broken and useless no one will want to use it.

So, who do you work for? Apple or Microsoft?

Re:Both good and bad news... (1)

ae1294 (1547521) | more than 3 years ago | (#36097498)

My company is on it...after a year through our processes, zeus will be so broken and useless no one will want to use it.

A year? WOW we only get three months per project! Where do you work?

oblig. (0)

Anonymous Coward | more than 3 years ago | (#36093202)

So, would that be a variation on security by obscurity?

Re:Both good and bad news... (1)

halfEvilTech (1171369) | more than 3 years ago | (#36093250)

I see a the dawn of a new era for the script kiddies of the dark corners of the interwebs.

I give it till tomorrow before we see new variants popping up if we are lucky.

Re:Both good and bad news... (0)

Anonymous Coward | more than 3 years ago | (#36093410)

New? This is basically whats been going on for more then a decade? This is just some more source code to add to the pool.

Re:Both good and bad news... (1)

AHuxley (892839) | more than 3 years ago | (#36093426)

Extendible to Mac and Linux?
Is this related to the http://www.eweek.com/c/a/Security/Crimeware-Kit-Targeting-Mac-OS-X-Mimics-Zeus-and-Spyeye-Features-642093/ [eweek.com]
"develop malware specifically for Mac OS X that uses the same templates as Zeus and Spyeye."
ie same "idea" or is the code base shared? Thanks

Re:Both good and bad news... (0)

wall0645 (1665631) | more than 3 years ago | (#36093682)

It's only bad for "the rest of us" if by "the rest of us" you mean "Windows users, the vast majority of computer users" because Microsoft will inevitably drag its feet in fixing its vulnerabilities (if it is even able to fix them) even though it now has a direct window into how Windows machines are being attacked.

I don't know a lot about Zeus, but if it can attack Linux machines, I would imagine the vulnerabilities would be fixed very promptly.

Re:Both good and bad news... (1)

Sulphur (1548251) | more than 3 years ago | (#36096850)

It's only bad for "the rest of us" if by "the rest of us" you mean "Windows users, the vast majority of computer users" because Microsoft will inevitably drag its feet in fixing its vulnerabilities (if it is even able to fix them) even though it now has a direct window into how Windows machines are being attacked.
 

That is because it is open source.

Re:Both good and bad news... (1)

wall0645 (1665631) | more than 3 years ago | (#36096932)

That is because it is open source.

I'm not following you.

Re:Both good and bad news... (1)

Sulphur (1548251) | more than 3 years ago | (#36097646)

That is because it is open source.

I'm not following you.

Those guys don't like open source, and that might stop them.

Re:Both good and bad news... (1)

jimicus (737525) | more than 3 years ago | (#36093880)

You know what? I'm not entirely convinced.

It may lead to stronger heuristics, but I can also see it leading to about a thousand variants, all just different enough to avoid tripping a scanner.

Re:Both good and bad news... (1)

Securityemo (1407943) | more than 3 years ago | (#36094260)

Google the term "packer".

Re:Both good and bad news... (1)

_0xd0ad (1974778) | more than 3 years ago | (#36094512)

Packed executable code has to be unpacked at some point before it is executed, and if the virus scanner is actively monitoring processes it can detect it at that point.

Re:Both good and bad news... (1)

Securityemo (1407943) | more than 3 years ago | (#36095400)

I am not a skilled reverser, but I have read about a solution to this problem: waiting out the antivirus sandbox by either doing seemingly harmless things for long enough or burying the malware code inside another executable (code cave, pushing code forwards and recalculating the references, etc.) referencing it from a place in the executable that is guaranteed to execute but after the sandbox timeout. AFAIK no antivirus scans process memory at intervals or otherwise "actively monitors" the memory of processes for malware signatures outside the sandbox virtual machine.

I've read about solutions that monitor the behaviour (API calls, etc.) of processes while they run, working a bit like SELinux in that regard, though.

Re:Both good and bad news... (0)

Anonymous Coward | more than 3 years ago | (#36096716)

Packed code in many packers nowadays is not "packed" but virtualized and obfuscated, with a different seed used each time, it doesn't get unpacked into a plain binary, it doesn't need to (the EP stub will execute the virtualized code rather then unpacking it).

Re:Both good and bad news... (1)

_0xd0ad (1974778) | more than 3 years ago | (#36096774)

Which is why virus scanners also monitor processes' behavior. The malicious code has to interact with the real system somehow, no matter how deeply it's virtualized or obfuscated.

Re:Both good and bad news... (1)

JohnRoss1968 (574825) | more than 3 years ago | (#36094982)

I Tried that....
But I cant for the life of me figure out what FUDGE has to do with viruses.

Re:Both good and bad news... (0)

Anonymous Coward | more than 3 years ago | (#36098018)

Packing fudge spreads them.

Re:Both good and bad news... (1)

Riceballsan (816702) | more than 3 years ago | (#36095026)

Well theoretically wouldn't that also give microsoft and security vendors a chance to adapt, patch the holes and flaws that allow the kit to work in the first place? Sure it's a huge extra fear since the source code is out and it can adapt to new holes faster, but I'd imagine the ones who were capable of finding and exploiting vulnerabilities were already a threat.

Tracking down the author for fun and profit (0)

Anonymous Coward | more than 3 years ago | (#36097712)

Slashdoters now have the authors fingerprints [coding-guidelines.com] and now some chance of tracking him down. After all developers who write decent quality code are hard to find and HR might offer a finders fee :-)

Re:Tracking down the author for fun and profit (1)

_0xd0ad (1974778) | more than 3 years ago | (#36097930)

I looked at that, and the first thing I noticed was where he puts two constructs in one line, like so:

for (;;) if()
{
}

Well shit... I do that. Isn't it obvious? There's only one block of statements; it will execute for each item in the list if the condition is true for that item. Why waste an extra level of indentation?

Success! (2, Insightful)

binarylarry (1338699) | more than 3 years ago | (#36093128)

Chalk up another victory for Open Source!

Err wait...

Re:Success! (4, Funny)

rednip (186217) | more than 3 years ago | (#36093450)

But it's not open source, it's pirated code. The copyright holders should sue!

Re:Success! (0)

Anonymous Coward | more than 3 years ago | (#36096126)

So if it were based on SCO unix...

Cool, now maybe we can get a Linux port (5, Funny)

halfdan the black (638018) | more than 3 years ago | (#36093200)

Why do Windows users get all kinds of great software like this, now with the source, maybe we can finally get some really great malware for Linux.

Re:Cool, now maybe we can get a Linux port (1)

drooling-dog (189103) | more than 3 years ago | (#36093348)

With all of the money and PR behind Windows, surely it can't be for the lack of trying.

Although to be fair I had a Linux box rooted back in 2001, due to some carelessness on my own part. Still have the trojan code, too...

Re:Cool, now maybe we can get a Linux port (1)

rednip (186217) | more than 3 years ago | (#36093548)

Still have the trojan code, too...

While it shouldn't be confusing, do you have it running as some sort of 'honey pot', or are you just a bit hoarder?

One of the things that people often tout about Linux is it's strong security model; however, I'll believe it's a true advantage when I even see a majority of system admins avoid the use of root for day to day activities/ process users.

Re:Cool, now maybe we can get a Linux port (3, Interesting)

jimicus (737525) | more than 3 years ago | (#36093818)

Meh. Like any security model, it's only good if it gets used properly in the real world.

Windows has a perfectly good security model, it's only when exposed to real-world use it falls over horribly. Make it too complex and people will do everything in their power to undermine it.

Re:Cool, now maybe we can get a Linux port (1)

rednip (186217) | more than 3 years ago | (#36094974)

Meh, that was exactly my point.

Re:Cool, now maybe we can get a Linux port (1)

Skapare (16644) | more than 3 years ago | (#36095442)

Windows bug number 1: Users.

Re:Cool, now maybe we can get a Linux port (1)

JWSmythe (446288) | more than 3 years ago | (#36097484)

    I can up you on that one. Well, kinda.

    I worked for a company that had "free hosting" servers. They were honestly free for customers that used our payment system. Since anyone could sign up, anyone did. We had all kinda of neat root kits, PHP shells, back doors, and the like installed. I'd sweep on a regular basis looking for them. We were locked down tight enough so they never broke very much of anything The worse would be someone would exploit something a user installed, which would deface their site. IDS helped a lot there though. :) Once in a great while, I'd find a lingering CGI which would turn out to be a back door listening on a port that wasn't open on our firewall, so all they managed to do was start a back door that no one could access.

    We'd investigate the "intrusion", make any necessary corrections so it wouldn't happen again (block the user and network who uploaded the malicious code, help the customer upgrade their software to current, and remind them that it's not safe to leave ancient packages running). I had a rather nice collection of malicious code. It was all dated, and tagged with incident notes.

    Unfortunately, when I left the company anything related to the company stayed there, so I no longer had my "collection".

    Some people never understood why I kept it. It wasn't ever to use against anyone. It did server two purposes. The first was, I could show new employees what people would try to do. Most thought such things were theoretical, so I would show them that they really happened. The second was to research methods used by the "bad guys". To effectively defend yourself, you have to be fully aware of their methods and capable of recreating them, and even improving on their attacks so we could stay ahead of them.

    Too many people being and end their security with "my servers are patched when we put them online" and "I have a firewall". All fine and dandy until you find out that it really wasn't enough.
   

Re:Cool, now maybe we can get a Linux port (1)

bigredradio (631970) | more than 3 years ago | (#36093352)

Dude! Shhhhhhhhhhhhhhhhh!

Re:Cool, now maybe we can get a Linux port (3, Insightful)

VortexCortex (1117377) | more than 3 years ago | (#36094032)

Why do Windows users get all kinds of great software like this, now with the source, maybe we can finally get some really great malware for Linux.

You jest, but your joke is confused. A "Linux port" would mean that users of Linux would be able to use the attack toolkit -- not that they would suddenly become susceptible to the Windows exploit vectors.

Thus a port wouldn't enable us to create malware targeting Linux any more than a Windows port of GCC suddenly makes MS Visual Studio better.

Re:Cool, now maybe we can get a Linux port (1)

Skapare (16644) | more than 3 years ago | (#36095478)

It depends on what parts of it you do the porting on. Where there is a piece of code that attacks some Windows exploit, you have to "port it" so that it attacks some Linux exploit. That's probably harder to do, but not impossible. Create enough incentive (like getting 100 million moms with credit cards to use Linux), and it will be solved in no time.

where is the code? (0)

Anonymous Coward | more than 3 years ago | (#36093272)

where is the code? where is the code?

Re:where is the code? (1)

Nyder (754090) | more than 3 years ago | (#36093360)

where is the code? where is the code?

What is google?

Re:where is the code? (1)

HelioWalton (1821492) | more than 3 years ago | (#36093432)

... Baby don't hurt me, don't hurt me, no more!

How is babby formed? (1)

sstamps (39313) | more than 3 years ago | (#36093882)

How is babby formed?

it was on the news this mroing (0)

Anonymous Coward | more than 3 years ago | (#36094452)

a mother in AR

Fixing holes (0)

Anonymous Coward | more than 3 years ago | (#36093364)

Wait, doesn't this mean that security systems maintainers can/will be forced to begin filling whatever loopholes Zeus is exploiting? Or does it exploit "unsolvable" issues?

Wonder if the devs of zeus... (1)

Nyder (754090) | more than 3 years ago | (#36093368)

... are going to sue any one for leaking their code?

=)

Re:Wonder if the devs of zeus... (0, Offtopic)

Anonymous Coward | more than 3 years ago | (#36093418)

it is a subject field, not a beginning of your post field

The damn 'subject field' (0)

countertrolling (1585477) | more than 3 years ago | (#36093726)

is anything we want it to be... What are you? the format police?

Go back to Hollywood, and complain about Modonna's dress, or lack thereof...

Re:The damn 'subject field' (1)

JohnRoss1968 (574825) | more than 3 years ago | (#36095030)

PLEASE DO NOT FEED THE TROLL

Re:Wonder if the devs of zeus... (-1)

Anonymous Coward | more than 3 years ago | (#36093518)

Your sentence makes no sense. "... are" implies a statement, yet you end with a question mark? To answer said question, I doubt three dots have the ability to sue anyone.

Re:Wonder if the devs of zeus... (0)

Anonymous Coward | more than 3 years ago | (#36093932)

Hmm, ... are you certain of that?

Re:Wonder if the devs of zeus... (0)

Anonymous Coward | more than 3 years ago | (#36094006)

Since you're obviously thick I'll spell it out for you. Combine the title of the post with the body of the post and consider the ellipsis (...) in the title as an indicator that the title continues into the body of the post, and the ellipsis in the body as the point where the title is continued.

[I] Wonder if the devs of zeus are going to sue any one for leaking their code?

So you can now hopefully see that the OP was not suggesting that ellipsis is going to sue, but that Zeus might consider suing. And before that further confuses you, it was a question asked tongue-in-cheek, you moron.

Re:Wonder if the devs of zeus... (1)

_0xd0ad (1974778) | more than 3 years ago | (#36094548)

If you're as pedantic as GP, that's still not a question.

"I wonder if the devs of zeus are going to sue anyone for leaking their code."

googibytes of malicious.biz.god.gov deflected (-1)

Anonymous Coward | more than 3 years ago | (#36093498)

disarm. tell the truth. the sky is not ours to toy with after all?
you call this 'weather'? what with real history racing up to correct
itself, while the chosen one's holycostal life0cider mediots continually
attempt to rewrite it, fortunately, there's still only one version of the
truth, & it's usually not a long story, or a confusing multiple choice
fear raising event.

world wide disarmament is taking place based on the pure intentions of the
majority of the planet's chosen to be depopulated, population. as the
biblical fiction based chosen ones have only one ability, which is
destruction for personal gain, they just don't fit in with all the new
life extending stuff that's we're being advised to ignore. life likes to
continue, advance etc... deception & death appear to have similar
ambitions.

wouldn't this be a great time to investigate the genuine native elders
social & political
leadership initiative, which includes genuine history as put forth in the
teepeeleaks etchings. the natives still have no words in their language to
describe the events following their 'discovery' by us, way back when. they
do advise that it's happening again.

Due to excessive bad posting from this IP or Subnet, anonymous comment
posting has temporarily been disabled. You can still login to post.
However, if bad posting continues from your IP or Subnet that privilege
could be revoked as well. If it's you, consider this a chance to sit in
the timeout corner or login and improve your posting. If it's someone
else, this is a chance to hunt them down. If you think this is unfair,
please email moderation@slashdot.org with your MD5'd IPID and SubnetID,
which are always changing, you butthead
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

dark side speaking russian translation-jedi needed (0)

Anonymous Coward | more than 3 years ago | (#36093662)

all the comments are in russian :(
up to now, i did not notice that the dark side was mainly speaking russian because i could never hear darth vader's voice through his helmet clearly.

jam3s? (3, Interesting)

Anonymous Coward | more than 3 years ago | (#36093690)

Doing a little forensics on the solutions file for the visual studio project, we can see that the username the hackers users on his Windows box is "jam3s". There are several strings in the solutions file that reference this username:

C : \ U s e r s \ j a m 3 s \ D e s k t o p \ Z e u s \
C : \ U s e r s \ j a m 3 s \ D e s k t o p \ Z e u s \ s o u r c e \ c l i e n t \ c o r e . c p p

I've seen this handle before in a lot of other malware designed to steal logon credentials and financial data.

Re:jam3s? (0)

Anonymous Coward | more than 3 years ago | (#36093812)

This guy is not 1337 enough, it should be j4m35.

Re:jam3s? (0)

Anonymous Coward | more than 3 years ago | (#36094298)

don't you mean j4|\/|35
or is it j4|\\/|35,
or j4\|\\/\|35
shit i forget

Re:jam3s? (1)

_0xd0ad (1974778) | more than 3 years ago | (#36094572)

C : \ U s e r s \ j 4 | \ / | 3 5 \ D e s k t o p \ Z e u s \ ... yeah, no. | \ / are illegal/reserved characters in a Windows pathname...

Re:jam3s? (-1, Flamebait)

datapharmer (1099455) | more than 3 years ago | (#36094290)

Wow it's lucky you found that. I've implemented it in snort:

alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"MISC malware author signature found"; flow:to_server,established; content:"jam3s"; classtype:misc-activity; sid:12345;)

Now all my networks are safe from logon stealing malware. I'm going to sleep well tonight knowing my networks are 100% safe again.

Re:jam3s? (0)

Anonymous Coward | more than 3 years ago | (#36094624)

Kill yourself.

Re:jam3s? (2)

_0xd0ad (1974778) | more than 3 years ago | (#36094678)

He can't read your comment - for some reason his firewall isn't letting him load this page anymore. Something about malware.

Re:jam3s? (0)

datapharmer (1099455) | more than 3 years ago | (#36094734)

hahahahaha. At least someone here has a sense of humor. I guess everyone else is scratching their heads and muttering "but that won't work..."

Re:jam3s? (1)

Sulphur (1548251) | more than 3 years ago | (#36097058)

He can't read your comment - for some reason his firewall isn't letting him load this page anymore. Something about malware.

Maybe if he goes to the right place, then the malware will infect him with the source.

--

Luke use the souce.

Re:jam3s? (1)

Anonymous Coward | more than 3 years ago | (#36095540)

funny... there's a jam3s on twitter [twitter.com] who appears to be an intern [itspj.com] at Intel [foursquare.com] in the UK. but surely that must just be a coincidence.

Re:jam3s? (0)

Anonymous Coward | more than 3 years ago | (#36096282)

funny... there's a jam3s on twitter [twitter.com] who appears to be an intern [itspj.com] at Intel [foursquare.com] in the UK. but surely that must just be a coincidence.

and there's a picture of him camping:
http://yfrog.com/h4lltkrj

Re:jam3s? (1)

Anonymous Coward | more than 3 years ago | (#36096156)

I think it might be this guy:

http://www.jam3s.net/

"Computers ~
I have a passion for computers and I learned about many different aspects of computers in terms of dialup service, networking, software, anti-virus / malware, website design, databases, servers, etc. I am always learning stuff with computers as computers are ever-changing. I have designed a few websites for different nonprofit organizations and companies. Microsoft sadly is my least favorite software company, however at the same time it is my favorite company. Most of their software is great by some of the features do not work well with others. Also, I think that a lot of their software is released in the Beta stage (too early)."

Yeah... (0)

Anonymous Coward | more than 3 years ago | (#36093824)

Yeah, just make this as public as possible, why don'tcha?
Really?

Re:Yeah... (1)

Anonymous Coward | more than 3 years ago | (#36094092)

Dude, the executable is essentially public. It's malware; it literally wants to spread. I could go to any of the dozen PC's currently in our "compromised" VLAN and pull off the Zeus binary.

Now, I have access to the source code too. I have access to information, I can use that to build understanding. That will only make my job of keeping the malware off our systems easier, ... because the binary is already frickin' everywhere.

I just have to ask.... (0)

Anonymous Coward | more than 3 years ago | (#36093884)

was wikileaks involved??????

Just wondering (1)

indecks (1208854) | more than 3 years ago | (#36094404)

What is the Zeus Crimeware Kit? I'm assuming it's something to help write viruses? I really don't know.

seriously, I dont know what it is.

Re:Just wondering (0)

Anonymous Coward | more than 3 years ago | (#36094640)

click this lazy:
http://www.google.com/search?q=+Zeus+Crimeware+Kit

Re:Just wondering (1)

indecks (1208854) | more than 3 years ago | (#36094884)

Thanks, but that doesn't tell me what it is, it just brings up news links to it being released - which I'm aware of because I read this post.

Re:Just wondering (1)

AHuxley (892839) | more than 3 years ago | (#36095044)

try http://www.eweek.com/c/a/Security/Crimeware-Kit-Targeting-Mac-OS-X-Mimics-Zeus-and-Spyeye-Features-642093/ [eweek.com]
Could offer options like: "The kit supports Web injects and form grabbing in Firefox. The templates used are identical to the ones used in Zeus and Spyeye, according to Kruse. The forms seamlessly inject fraudulent fields into legitimate Websites that are intended to trick users into entering additional sensitive information. When the data is entered, it is automatically transmitted back to the malicious owner."

Re:Just wondering (1)

JohnRoss1968 (574825) | more than 3 years ago | (#36095594)

OK I will explain.
Since the rise of modern religions like Christianity and Judaism, The Gods of the older religions, such as the Norse Gods and the Greek Gods have gotten left behind.
With nothing to do some of them have taken up hobbies.
Hestia has her own show on the Food network. Good recipes btw, although she tends to over use the Greek yogurt to much for my tastes.
Aphrodite started a marriage consoling service with Hera.
Poseidon opened up a water park, the rides were great but it was shut down due to legal actions over the name Poseidon's Adventure Water Park.
Hermes has his own line of sneakers out with Nike.
Apollo started hanging out with the Hollywood types. He was last seen hanging out with Charlie Sheen and some porn stars. I bet he ends up in a rehab before the years end.
And Zeus , as you probably have guessed by now Fights crime in his spare time. He got the idea of a Crime-ware kit from Batman. He does not have a costume, as he claims the tights chafed too much.
I hope that helps, If not here are a few links that may explain better than I did.

http://tinyurl.com/5r2ke8e [tinyurl.com]
http://tinyurl.com/4x2waph [tinyurl.com]

Re:Just wondering (0)

Anonymous Coward | more than 3 years ago | (#36096228)

Nice malware links. TinyURL my crime-fearing-ass.

(Srsly, why the hell would you use URL shortening when not using that service for twits (nevermind why would you use that in the first place)?)

Re:Just wondering (1)

DMUTPeregrine (612791) | more than 3 years ago | (#36096036)

It's a kit to assemble credit-card stealing keylogger worms. Select the expliots to use, select the payloads, tell it where to send the data, what your command and control servers are, compile, and steal data.

Re:Just wondering (0)

Anonymous Coward | more than 3 years ago | (#36097844)

http://en.wikipedia.org/wiki/Zeus_botnet

This?

freenet (0)

Anonymous Coward | more than 3 years ago | (#36094494)

Saw this in the 'leak' board on FMS

CHK@V7zSetO6-h3DjEV59J4H7TBltII7t4-KqEg9zuFS3RM,Nez8p8nmxsDQf8UXE4p1mKFSwwAJX0h4c6iSifA0bjw,AAIC--8/ZeuS.2.0.8.9-source-code__password-is-zeus.rar

Don't feel like fetching it though.

plagiarism (0)

Anonymous Coward | more than 3 years ago | (#36095174)

He copied quicksort from http://www.gentee.com/source/src/algorithm/qsort_c.htm without acknowledging.

Ctrl+p (0)

Anonymous Coward | more than 3 years ago | (#36095412)

So, now I have something interesting to read before I go to bed.

But who would let it out (1)

Stu101 (1031686) | more than 3 years ago | (#36097746)

Thinking about this over dinner, I came to a thought about HOW this got put into general availability.

This crimeware kit is like $10,000 a go. If I where the developer, I would be very careful about where copies go and security on the local machine. So either this guy, or his backups got hacked, or the other potential way it got out is through a trusted client or similar.

It would be sweet irony if the malware developer got pawned by another piece of malware, but I guess we will never know.

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?