Jabber Zeus

Jabber Zeus was a cybercriminal syndicate and associated Trojan horse created and run by hackers and money launderers based in Russia, the United Kingdom, and Ukraine.[a] It was the second main iteration of the Zeus malware and racketeering enterprise, succeeding Zeus and preceding Gameover Zeus.

Jabber Zeus was operational from around 2009 until 2010. The crew, consisting of nine core members, sent spam emails containing the Trojan to small businesses. The Trojan would send the victim's banking information, including one-time passwords, in real-time, using the Jabber protocol, to the criminals, who would use the information to drain the victim's bank account of funds and launder it using a massive network of money mules, where it would eventually reach the group. The malware may also have been used for espionage. In September 2010, the Trojan was updated to include several other capabilities designed to enhance its security.

Between September 30 and October 1 of 2010, several key members and money mules for the group were arrested in a joint operation between the Federal Bureau of Investigation, the Russian Federal Security Service, the Security Service of Ukraine, and police agencies in the United Kingdom and the Netherlands. Although the individuals arrested in Ukraine were quickly released due to core member Vyacheslav Penchukov's government connections and no conspirators were arrested in Russia, the group was effectively shut down by the arrests. A year later, in September 2011, the group and malware would re-emerge as Gameover Zeus.

  1. ^ "Evolution of the GOLD EVERGREEN Threat Group". Secureworks. May 17, 2017. Archived from the original on January 27, 2023. Retrieved May 5, 2023.
  2. ^ Stahie, Silviu (November 18, 2022). "Alleged JabberZeus Crime Gang Leader Arrested in Switzerland". Bitdefender Blog. Archived from the original on May 5, 2023. Retrieved May 5, 2023.
  3. ^ Danchev, Dancho (June 2, 2021). "Profiling the "Jabber ZeuS" Rogue Botnet Enterprise – An Analysis". WhoisXML API. Archived from the original on December 5, 2022. Retrieved May 5, 2023.
  4. ^ Bederna, Zsolt; Szádeczky, Tamás (2021). "Effects of botnets – a human-organisational approach". Security and Defence Quarterly. 35 (3): 35. doi:10.35467/sdq/138588.
  5. ^ Sandee 2015, p. 6.
  6. ^ Sandee 2015, p. 4.
  7. ^ Graff, Garrett M. (March 21, 2017). "Inside the Hunt for Russia's Most Notorious Hacker". WIRED. Archived from the original on April 23, 2023. Retrieved May 7, 2023.
  8. ^ Peterson, Sandee & Werner 2015, 7:42–7:47.


Cite error: There are <ref group=lower-alpha> tags or {{efn}} templates on this page, but the references will not show without a {{reflist|group=lower-alpha}} template or {{notelist}} template (see the help page).