GameOver Zeus Malware: 5 Fast Facts You Need to Know

GameOver Zeus Malware, botnet, GameOver Zeus, gameover zeus removal, gameover malware, game over malware, malware detection, malware removal


All those scary reports about the GameOver Zeus malware got you freaked? Learn about this botnet threat and how to protect yourself right here.

1. GameOver Zeus Malware Is a P2P Form of Malware

Learn more about this vicious malware in the audio report above.

The US Computer Emergency Readiness Team describes GameOver Zeus as a peer-to-peer variant of a type of malware called Zeus. It is also referred to as GOZ in some circles. The CERT team explains:

“GOZ, which is often propagated through spam and phishing messages, is primarily used by cybercriminals to harvest banking information, such as login credentials, from a victim’s computer. Infected systems can also be used to engage in other malicious activities, such as sending spam or participating in distributed denial-of-service (DDoS) attacks.”

According to the FBI, GameOver Zeus can steal your username and passwords, and subsequently drains your bank account.

2. GameOver Zeus Can Be Removed By Virus Scanners

Five Things You Need To Know About GameOver Zeus MalwareComputer users are being urged to protect their machines from malware which allows hackers to steal financial data. Here are five things you need to know about GameOver Zeus, a type of bank credential-stealing malware. SUBSCRIBE to our YouTube channel for more great videos: Follow us on Twitter: and Like us…2014-06-03T13:59:43Z

The video above gives you a detailed rundown of GameOver Zeus.

US CERT recommends the use of Symantec, Sophos, Heimdal, F-Secure, or Microsoft to identify and remove GameOver Zeus from an infected computer. By simply updating your trusted anti-virus software and running a scan, you should be protected.

3. Evgeniy Mikhailovich Bogachev Believed to Be Behind GameOver Zeus

The Verge reports that Evgeniy Mikhailovich Bogachev is the “mastermind” behind the malicious GameOver Zeus botnet network. It is believed that the botnet was responsible for stealing $100 million from people all over the world.

4. GameOver Zeus Has Been Linked to CryptoLocker

The Verge notes:

“The botnet also raised money through Cryptolocker an attack that would encrypt a computer’s hard drive, demanding a ransom to unlock the data. For those that didn’t pay, data-recovery costs reached as high as $80,000. Researchers say the botnet has been operational since October of 2011, but used a complex P2P mechanism to cover its tracks, making it difficult to track down before now.”

Cryptolocker is known to have affected tens of thousands of computers.

5. US, Italy, UK Among the Countries Most Affected by GameOver Zeus

Symantec has reported which countries have been most heavily targeted by the GameOver Zeus malware. The US and Italy lead, with the UAE, Japan, the United Kingdom, and India following close behind.

Comment Here
Notify of
1 Comment
Oldest Most Voted
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x