article thumbnail

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

The source code of the Zeus Trojan is available in the cybercrime underground since 2011 allowing crooks to develop their own release since. Data collected by the malware are then transferred to the operator’s command-and-control (C2) server. The malware is able to infect all operating systems.

Banking 132
article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

O’Neill said he opened the investigation into Ngo’s identity theft business after reading about it in a 2011 KrebsOnSecurity story, “ How Much is Your Identity Worth? Ngo said he started taking classes again back in Vietnam, but soon found he was spending most of his time on cybercrime forums.

article thumbnail

Prilex: the pricey prickle credit card complex

SecureList

The first two samples had 2010/2011 as the compilation date, as shown on the graph below. These cryptograms will then be used in a fraudulent transaction through one of the cybercrime tools whose output log can be seen below. The table above shows the data collected from the malware. START GHOST] _. START GHOST] _.

Malware 103