The Latest in IT Security

ZeuS Trojan Configuration File Disguised as Harmless Image

18
Feb
2014

Security researchers have analyzed a new version of the notorious ZeuS banking Trojan. The new variant, ZeusVM, is designed to retrieve its configuration file from an image.

Experts from Malwarebytes and French security researcher Xylitol have noticed that alongside other components, the malware is retrieving a JPG image from a server.

A closer analysis of the file revealed that it was an image copied from the web, but with some additional code appended to it. By usin…

Comments are closed.

Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments