<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="https://info.threatstop.com/hubfs/zeus-greek-gods.jpg" alt="Zeus Statue" title="Zeus Statue" caption="false" data-constrained="true" style="width: 455px; display: block; margin-left: auto; margin-right: auto;" width="455"></p> <p>The <strong><a href="https://blog.threatstop.com/2010/08/16/blocking-the-zeus-botnets" target="_blank">ZeuS</a></strong> malware family was first seen in July 2007, and is the poster child for long-lasting bots. <strong>Zbot</strong>, one of the aliases of <strong>ZeuS</strong>, has a familial relation to <strong>Terdot</strong>. When <strong>ZeuS</strong>'s source code leaked in 2011 bad actors jumped at the chance to start updating its capabilities based on their campaigns. One of these offspring was <strong>Terdot</strong>. <a href="https://blog.malwarebytes.com/cybercrime/2017/01/zbot-with-legitimate-applications-on-board/" target="_blank">MalwareBytes</a> has made a study of the <strong>ZeuS</strong> family, and have noted a recent increase in <strong>Terdot</strong>/<strong>Zloader</strong> infections.</p> <!--more--> <p><strong>Zloader</strong> acts as the loader for <strong>Zbot</strong>, its attack vector for its current campaign is through phishing, or dropping by <strong>SunDown EK</strong>. Once the initial component of <strong>Zloader</strong> runs, it deploys Windows Explorer (explorer.exe) and injects shellcode along with a new Portable Executable (<a href="https://dochub.threatstop.com/display/TS/P#P-_pe" target="_blank">PE</a>) file containing payload.dll. In turn, with Internet access available, enables <strong>Zloader</strong> to download <strong>Zbot</strong> and other modules.</p> <p>One of the main objectives of this campaign is to setup Man-In-The-Middle (<a href="https://dochub.threatstop.com/display/TS/M#M-_mitm" target="_blank">MITM</a>) attacks. Using legitimate files and applications, such as certutil, the malware installs a fake SSL certificate. This replaces a legitimate certificate used when communicating with a site via HTTPS. The user is not notified by the browser - as it can't detect the change - and the compromise is only detected during an active search.</p> <p>The malware is being targeted at financial institutes and banks according to <a href="https://www.scmagazine.com/terdot-zloaderzbot-combo-abuses-certificate-app-to-pull-off-mitm-browser-attacks/article/634443/" target="_blank">scmagazine.com</a>. Whom determined this by an encoded target list in the malware's payload.</p> <p>Enabling the <strong>TSCritical</strong> targets in your user policy will add protection against <strong>Zloader</strong>/<strong>Terdot</strong> to your ThreatSTOP DNS and IP Firewall Services. If you do not have a ThreatSTOP account&nbsp; for a free trial.</p> <p>If you have a ThreatSTOP account, instructions to add targets to <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our&nbsp; team.</p></span>