ZeuS Trojan responsible for more than half of all online banking attacks

G Data analysis shows the dominance of this dangerous type of malware

05/16/2013 | Bochum 

Along with phishing campaigns, banking Trojans are the principal method chosen by cyber criminals to attack users and manipulate online transactions. The G Data Security Labs analysis for the first quarter of 2013 revealed that ZeuS Trojans and variants of these are currently the commonest programs used to launch such attacks, representing more than half of all infections detected during the first three months of this year. The ZeuS clone Citadel was one of the biggest culprits. The number of infections has increased slightly compared to the last quarter of 2012, even though arrests have once again been making life difficult for cyber criminals. G Data expects the number of dangerous malware programs to continue to rise in the coming months.

 

Families of banking Trojans in the first quarter of 2013

 

Outlook for the coming months

  • Banking Trojans on the increase again: G Data Security Labs expect that ZeuS, Carperb and the like will continue to consolidate their stronghold in the area of bank customer fraud. The cyber criminals will bounce back from the numerous arrests of recent months, leading to another increase in the number of infections via banking Trojans. But then, the income opportunities for cyber criminals in this eCrime sector are immense.
  • Use of anonymisation services: In G Data's opinion, cyber criminals will be increasingly looking to cover up their tracks during online banking fraud. As with a number of botnets, communication between banking Trojans and the command-and-control servers will take place in the background via anonymisation services such as the Tor network. In addition to this, experts at G Data Security Labs expect that Twitter and other peer-to-peer networks will continue to be misused by criminals.

Kathrin Beckert