Zeus' coffin not yet closed as domains still living

By
Follow google news

Three domains are still feeding instructions to computers infected with the Zeus trojan.

Three command-and-control (C&C) servers, which are feeding instructions to computers infected with the Zeus trojan, still are operational despite a Microsoft-led effort to disable the botnet, according to researchers at security firm FireEye.


Late last month, US Marshals led the raid on hosting locations where they confiscated C&C servers and took down two key IP addresses in the process.

In addition, as a result of the seizure, Microsoft assumed control of some 800 domains involved with the servers, a process known as sinkholing.

Atif Mushtaq, a senior staff scientist at FireEye, said in a blog post this week that the company has tracked more than 150 domains used by the botnet.

But researchers found that despite the dismantling, three domains associated with Zeus remain live.

Botnets sometimes are able to stay alive by hiding behind fast-flux, or constantly changing, domains, but Mushtaq seems perplexed as to exactly why these three have been so resilient.

"[Microsoft's] main concern should be the three active domains," Mushtaq wrote. "Without these domains completely destroyed, this botnet can not be officially declared as dead."

A Microsoft spokeswoman did not immediately respond to a request for comment.

This article originally appeared at scmagazineus.com

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Supply chain attack hits 100 million-download Axios npm package

Supply chain attack hits 100 million-download Axios npm package

CBA onboards customers with NFC scans of ePassports

CBA onboards customers with NFC scans of ePassports

WA local gov entity lost $350,000 in phishing attack

WA local gov entity lost $350,000 in phishing attack

APRA pulls data submission system after security pentest

APRA pulls data submission system after security pentest

Log In

  |  Forgot your password?