Hackers Go After Big Money Bank Accounts

In what can only best be described as a zombie threat to payments security, hackers have resurrected the heretofore-defunct GameoverZeus bot.net that was used to infect computers with malware.

    Get the Full Story

    Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required.

    yesSubscribe to our daily newsletter, PYMNTS Today.

    By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions.

    According to internet security blogger Brian Krebs, after a month of inactivity after federal officials shut the bot net down, phishing emails laced with booby trapped attachments started going out from a site that shares roughly 90 percent of its code base with GameoverZeus.

    While the previous instantiation of GameoverZeus was based on an advanced P2P network, the undead version makes use of an approach known as fast-flux hosting. That allows botnets behind ever-changing proxy networks of compromised systems more resilient to takedowns.

    The botnet is particularly focused on high-dollar corporate account takeovers that frequently were punctuated by massive distributed-denial-of-service (DDoS) attacks intended to distract victims from immediately noticing the thefts. It seems that despite the massive takedown, hackers intend to continue using the site, which the DOJ believes is responsible for the theft of more than $100 million in account takeovers.

    “What’s Hot” is aggregated content. PYMNTS.com claims no responsibility for the accuracy of the content published by the original source.