Microsoft tool unable to detect new versions of Zeus

Powered by SC Magazine
 

"A good first step".

Though Microsoft has added new protection capabilities to its Malicious Software Removal Tool (MSRT) to help organisations fight Zeus, its tool is ineffective at detecting the newest version of the insidious data-stealing malware, according to researchers at security firm Trusteer.

Last month, coinciding with the release of its monthly bundle of security fixes, Microsoft added Zeus detection and removal capabilities to the freely distributed MSRT.

But after testing the tool against hundreds of Zeus files, Trusteer researchers determined that it is able to detect and remove an old version of Zeus 46 percent of the time but is unable to protect against the latest version, Mickey Boodaei, CEO of Trusteer, told SCMagazineUS.com.

“What Microsoft did is a good first step, but in terms of effectiveness and sustainability against Zeus, we think there is a lot more work to do,” Boodaei said.

The most recent version of Zeus contains sophisticated capabilities to evade detection, Boodaei said.

Each time the data-stealing trojan is installed on a machine, its footprint changes, meaning all the filenames and registry keys associated with the malware are unique, he said. Even older versions of the malware contain less sophisticated capabilities that allow it to evade anti-virus detection most of the time.

“The good news is that MSRT has and will be able to kill approximately half of the Zeus population,” Boodaei wrote in a blog post. “This detection rate is very respectable since most anti-virus solutions, if not all, have a much lower detection rate.”

One week after adding the protection capabilities, Microsoft said the tool cleaned Zeus, also known as Zbot, 281,491 times from 274,873 computers, making it the most prevalent family of malware removed from machines.

However, according to Trusteer, the tool is not able to prevent Zeus-related fraud in a majority of cases because it does not operate in real time.

Financial fraud typically occurs within hours or days after a computer is infected with Zeus because sensitive information is immediately transmitted to criminals, Boodaei said. Attackers have a “window of opportunity” between the time a computer is infected with Zeus and the next MSRT scan to steal money from a victim's bank account.

“The fraudsters are very quick to act,” Boodaei said. “You get infected, they analyse your computer, the next time you go onto your bank account the fraud occurs.”

The computer security industry as a whole is lagging behind the Zeus authors, he added.

“We need to find more ways of removing the dependency on signatures and the need to know what Zeus looks like and how it behaves in order to block it,” he said. “That's the only way of successfully fighting Zeus in this dynamic world the fraudsters have created.”

A Microsoft spokesperson did not immediately respond to a request for comment.

See original article on scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
This 4G smartphone costs $219
Sep 3, 2014
It's possible to spend a lot less on a smartphone if you're prepared to go with a brand you ...
Looking for storage? Seagate has five new small business NAS devices
Aug 22, 2014
Seagate has announced a new portfolio of Networked Attached Storage (NAS) solutions specifically ...
Run a small business in western Sydney?
Aug 15, 2014
This event might be of interest if you're looking to meet other people with a similar interest ...
Buying a tablet? Microsoft's Surface Pro 3 goes on sale this month
Aug 8, 2014
Microsoft has announced its Surface Pro 3 will go on sale in Australia on 28 August from ...
Apple's top MacBook Pro with Retina is now cheaper
Aug 1, 2014
Apple has updated its MacBook Pro range with faster processors and new pricing, including ...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1052

Vote