GameOver ZeuS ( GOZ), also known as peer-to-peer ( P2P) ZeuS, ZeuS3, and GoZeus, is a Trojan horse developed by Russian cybercriminal Evgeniy Bogachev. Created in 2011 as a successor to Jabber Zeus, another project of Bogachev's, the malware is notorious for its usage in bank fraud resulting in damages of approximately $100 million and being the main vehicle through which the CryptoLocker ransomware attack was conducted, resulting in millions of dollars of losses. At the peak of its activity in 2012 and 2013, between 500,000 and 1 million computers were infected with GameOver ZeuS.
The original GameOver ZeuS was propagated through spam emails containing links to websites that would download the malware onto the victim's computer. The infected computer was then integrated into a botnet, considered to be one of the most sophisticated and secure botnets in the world at the time. The GOZ botnet was particularly notable for its decentralized, peer-to-peer infrastructure, which combined with other security measures such as made shutting down the botnet extremely difficult. The botnet's activities were additionally directed by an organized crime group headed by Bogachev, which was primarily based in Russia and Eastern Europe. The syndicate further complicated attempts to combat it by law enforcement and security researchers using a large money laundering network and DDoS attacks, used as both retaliation and as a form of distraction during thefts.
In 2014, the original GameOver ZeuS botnet was shut down by a collaboration between several countries' law enforcement and private cybersecurity firms, named Operation Tovar. Bogachev was indicted shortly after and a reward of $3 million was issued for information leading to his arrest, at the time the highest reward for a cybercriminal in history. Less than two months after Operation Tovar was executed, a new strain of GameOver ZeuS was discovered. Named "newGOZ", it lacked peer-to-peer capabilities but otherwise shared ninety percent of its codebase with the original GOZ. The involvement of the original GameOver ZeuS administrators in newGOZ's activity since its creation is disputed.
The creator and main developer of the original Zeus was Evgeniy Bogachev, also known as "lucky12345" and "slavik". The original version of Zeus was "kit malware"—a prospective cybercriminal would purchase a Software license to use a copy of Zeus or obtain an inferior, free version.: "Basically, Zeus has existed for nearly a decade, and the first two versions that we distinguish—although the first two versions were basically the same, they're just like an evolution of the previous version—they were sold as kit malware. And 'kit malware' means that you can actually purchase it and set it up on your own servers, and only require, basically, a support package to get the latest updates." With the license, the purchaser could use Zeus to make their own Trojan, which they could use as they pleased. In late 2010 Bogachev announced that he was retiring from cybercrime and handing over Zeus's code to a competitor called SpyEye. Security researchers viewed the move with skepticism, as Bogachev had on multiple previous occasions announced his retirement only to return with an improved version of Zeus. In fact, Bogachev had not retired, but had transitioned from selling Zeus as kit malware to the general criminal underground to selling access to fully completed versions of the Trojan to a narrower clientele.: "In 2010, the author of Zeus, nicknamed 'slavik', he basically announced that he would no longer support it and give the support to other people. He said that he would retire, but what had actually happened was that he started a private branch, and not anymore sell it '' This "private" version of Zeus became known as Zeus 2.1, or Jabber Zeus. Jabber Zeus-facilitated crimes were run by an organized crime syndicate, of which Bogachev was a key member, which largely dissolved in 2010 due to police action.
Researchers became aware of the GameOver ZeuS botnet in 2011. In January 2012, the FBI issued warnings to companies instructing them to look out for GOZ. The name "GameOver ZeuS" was invented by security researchers, and comes from a file named "gameover2.php" used by the C2 channel.: "'GameOver ZeuS,' the name, comes from the command and control channel using 'gameover2.php' when it started." Other names have included peer-to-peer ZeuS, ZeuS3, and GoZeus. The malware was known within Bogachev's crime network as Mapp 13, "13" being the version number.
Usage of GameOver ZeuS was managed by Bogachev and a group that referred to itself as the "business club". The business club consisted mostly of criminals who had paid a fee to be able to use GOZ's interface. By 2014 there were around fifty members of the business club, mostly Russians and Ukrainians. The network also employed technical support staff for the malware. The criminal network's members were spread across Russia, but the core members, such as Bogachev, were mainly based in Krasnodar. Business club members did not exclusively use GOZ and were often members of other malware networks. Nonetheless, the United States Department of Justice (DOJ) described the group's members as "tightly knit".
In addition to the business club, a large number of were recruited to Money laundering stolen funds. Mules, based in the US to avoid suspicion, were recruited through spam emails sent by the GOZ botnet, offering part-time work. Money mules were not aware that they were handling stolen funds or working for a criminal syndicate.
The business club controlled all GameOver ZeuS activity from 2011 to 2014. The syndicate primarily used GOZ to engage in bank fraud and extortion, however, other revenue streams such as click fraud and renting out the botnet were known to exist.
Beginning in November 2011, the operators of GOZ would conduct DDoS attacks against banking websites if they were stealing a large amount of money, in order to prevent the victim from logging in and to divert the attention of network administrators away from the theft. The DDoS attacks were performed using a commercially available kit named "Dirt Jumper". Stolen money was routed through a large network of money mules before it made it to the criminals, hiding its origin and destination from authorities. By June 2014, more than $100 million was stolen in the United States alone.
The siphoning of money followed the day-night line, beginning in Australia and ending in the United States. Criminals involved in money movement worked nine-to-five shifts from Monday to Friday, handing over responsibilities to whatever team was west of them when their shift ended. The final destination of most money mule transfers were shell companies based in Raohe County and the city of Suifenhe, two regions in China's Heilongjiang province on the China–Russia border.
The interface controlling the botnet could be used to read data logged by the bots and execute commands. In addition to the token grabber panel, another panel existed to facilitate the siphoning of money from bank accounts, allowing the user to select a "destination account" that money would be indirectly sent to. Botnet managers were also allowed to load their own scripts to use against infected systems, with the caveat that they could not attack Russian computers.
Between 200,000 and 250,000 computers were attacked by Cryptolocker beginning in 2013. The amount of money Bogachev and associates made from CryptoLocker is unclear; Wolff claimed that in a one-month period from October to December 2013 alone, $27 million was stolen. However, Michael Sandee, one of the researchers who helped take down the original GameOver ZeuS botnet, has given a much lower estimate of $3 million for the entire duration of CryptoLocker's activity. Wolff has argued that GameOver ZeuS's legacy lies not in its innovative P2P botnet structure, but in the precedent it set in CryptoLocker for future ransomware attacks.
It is unclear who specifically was responsible for the espionage operations; while security researcher Tillman Werner, who helped to take down the original GOZ botnet, has suggested the possibility of a partner or client being involved, Sandee has claimed that Bogachev was primarily or solely responsible, arguing that he had sole access to the malware's surveillance protocols and that because his circle of criminal associates included Ukrainians, he would have to keep the espionage secret. Sandee has speculated that the botnet's usage for espionage afforded Bogachev "a level of protection" that can explain why he has yet to be apprehended, despite living openly and under his own name in Russia.
The botnet was organized into three layers. The lowest layer was made up of the infected machines, some of which were manually designated "proxy bots" by the criminal group. Proxy bots acted as intermediaries between the bottom layer and a second proxy layer composed of dedicated servers owned by the group. The second layer served to create distance between the infected machines an the highest layer, from which commands were issued and to which data from the infected machines was sent. This infrastructure made tracing the botnet's C2 servers more difficult, as the botnet herders were only ever directly communicating with a small subset of infected computers at a time. Although the botnet as a whole was structured like this, the network was partitioned into several "sub-botnets", each run by a different botmaster. Up to 27 of these sub-botnets existed, but not all were actively used, with some existing for debugging purposes.
Crawlers were inhibited via various means. Each bot had fifty peers; however, a bot that was requested to provide a list of its peers would only return ten. Additionally, requesting peer lists was rate-limited such that rapid requests from an IP address would result in that address being flagged as a crawler and automatic blacklisting, halting all communications between the flagged IP and the flagging bot. Each bot also had a pre-existing list of blacklisted addresses known to be controlled by security organizations.
Sensors were inhibited via an IP filtering mechanism that prevented multiple sensors from sharing one IP address. The effect of this was to prevent individuals or groups with one IP address from carrying out DNS sinkhole attacks on the botnet. GOZ's botmasters were known to have carried out DDoS attacks in response to sinkholing attempts.
In the event a GOZ bot was unable to contact any peers, it would use a domain generation algorithm (DGA) to re-establish contact with the C2 servers and obtain a new list of peers. The DGA generated one thousand domains every week and each bot would attempt to contact every domain; this meant that if the botnet's current C2 servers were in danger of being shut down, the botmasters could set up a new server using a domain in the generated list and re-establish control over the network. The servers themselves were provided by a bulletproof hosting service, and were difficult to take down because the servers did not have actual IP addresses; traffic was routed from virtual IP addresses that did not correspond to any device. Taking down the addresses, therefore, would not affect the servers.: "Looking at, for example, the technical part, the hosting: so where did they get servers? This has changed over time, but especially in the last period, the last few years, they had access to a bulletproof hosting provider who had a very good system of having servers without an actual IP address, just a netblock, and then had virtual IPs from completely different ISPs and routed that through tunnels to those servers. So in case anyone would take down the 'virtual IP addresses', it would just not route anymore, but the actual servers where the data was were safe."
Communications between bots were encrypted. The algorithm used for this changed over time: prior to June 2013, GOZ used a XOR cipher, but new bots after June 2013 used RC4, which made infiltrating the botnet more difficult. Additionally, important communications coming from the botnet's managers were signed using RSA.
A special "debug build" of the malware existed that provided detailed logs regarding the network. The debug build existed to garner insight into security researchers' activities against the botnet and develop appropriate responses. The malware itself was also difficult to remove, owing to a rootkit contained in it. The rootkit, Necurs, was taken from a different piece of malware.
With preparations finished, Operation Tovar began on May 30 and was completed within four to five hours. The operation was a sinkholing attack that cut off communication between the bots and their command servers, redirecting the communication towards the aforementioned government-controlled servers. Since the GOZ-controlled domains were registered in Russia, outside American jurisdiction, law enforcement ordered US-based internet service providers to direct attempts to contact GOZ-controlled domains towards FBI-controlled servers before the queries reached Russia. The technical details of the operation largely remain classified. Additionally, law enforcement in Canada, France, Germany, Luxembourg, the Netherlands, Ukraine, and the United Kingdom began seizing key GOZ servers on May 30.
On June 2, the United States Department of Justice announced the outcome of Operation Tovar. An indictment against Bogachev was also unsealed that same day. However, authorities also warned that the botnet would likely return within two weeks. On July 11, the DOJ stated that as a result of the operation, GOZ infections were down 32 percent and that nearly all infected computers had been "liberated from the criminals' control". On February 24, 2015, the Justice Department announced a reward of $3 million for information leading to Bogachev's arrest, at the time the largest-ever reward for a cybercriminal. Bogachev remains wanted as of 2024.
The new malware was divided into two variants. The variants differed in two areas: the number of domains generated by the DGA, with one generating 1,000 domains per day and the other generating 10,000; and the geographic distribution of infections—the former variant primarily infected systems in the US, and the latter targeted computers in Ukraine and Belarus. On July 25, 2014, it was estimated that 8,494 machines had been infected by newGOZ. Other GOZ variants, including "Zeus-in-the-Middle", which targets mobile phones, have been reported as well. As of 2017, variants of Zeus constitute 28% of all banking malware. However, Sandee has claimed that much of Zeus's market share is being taken away by newer malware.
Origins and names
Criminal activity
Modus operandi and management
Bank theft and interface
CryptoLocker
Espionage
Technical features
Botnet structure
Security
Investigations, takedown, and re-emergence
Operation b71
Operation Tovar
Re-emergence as "newGOZ"
See also
Similar Russian and Eastern European cybercrime groups:
Similar botnets:
Notes and references
Notes
General sources
External links
|
|