While conducting research, I encountered a curious-looking new ZeuS/ZBOT sample (detected as TSPY_ZBOT.ZCZ) using a very old toolkit version. I retrieved the sample two days ago. After some debugging/reversing, I found out that this specific sample targeted several banks around the globe, including Russian banks.
Here is a snippet listing down the targeted Russian banks and/or Yandex:
https://www.telebank.ru/web/front/login.x/*TAN* *transactionID=* *
https://i.bank24.ru/confirm/payment.*TAN* *pincode=* *
This ZeuS/ZBOT sample also targeted banks found in Germany, the United States, the United Kingdom, Poland, the Netherlands, Italy, Spain, France, Belarus, Bulgaria, Australia, Ireland, the United Arab Emirates, Turkey, and New Zealand.
This is the first time I’ve seen ZeuS target Russian banks given that online banking is not so popular in Russia. I can recall a few ZeuS/ZBOT samples targeting Yandex services, but I definitely can’t recall anyone targeting MDM Bank or other online Russian banking systems.
Is this a sign? Are we going to see more ZeuS/ZBOT variants targeting this region once online banking becomes more popular in the country as in Western countries? If this is so, how much will the cybercriminals sell the information they will steal?
These are just some of the thought-provoking questions that, I guess, only the future can answer.
TrendLabsSM has also documented previous yet interesting finds about ZeuS/ZBOT in the following entries: