Is Zeus source code for sale?

Powered by SC Magazine
 

Trojan could be on the auction block at a hacker forum near you.

The source code for the Zeus Trojan has reportedly been found on sale online.

According to a blog by Peter Kruse, partner and security specialist at CSIS Security, several individuals have announced that they have access to the Zeus source code in recent weeks and that it is for sale.

“We are currently not able to verify any of these claims, however this particular announcement has a picture attached which might prove that parts of the source code are indeed in the hands of someone using the handle ‘IOO'," Kruse wrote.

“Prior to this there were several rumours that the Zeus code was sold to the creator of SpyEye. This is also currently unconfirmed, however what is fact is that someone besides the author of the Zeus has access to the code and this we can document.”

Rik Ferguson, director of security research and communications at Trend Micro, was sceptical.

“Some vendors [hackers] are saying that they have this for sale but they are always saying that they have things for sale that they do not have, such as malware, credit card details, credentials and botnets, but it is often not true as they are just interested in stealing money.

"The reality of this is that it is possible but it is not substantiated.”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Photos: Global Switch opens Sydney East data centre
First stage opened, to some fanfare.
 
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 488

Vote