GameOver Zeus Malware: 5 Fast Facts You Need to Know

GameOver Zeus Malware, botnet, GameOver Zeus, gameover zeus removal, gameover malware, game over malware, malware detection, malware removal


All those scary reports about the GameOver Zeus malware got you freaked? Learn about this botnet threat and how to protect yourself right here.

1. GameOver Zeus Malware Is a P2P Form of Malware

Learn more about this vicious malware in the audio report above.

The US Computer Emergency Readiness Team describes GameOver Zeus as a peer-to-peer variant of a type of malware called Zeus. It is also referred to as GOZ in some circles. The CERT team explains:

“GOZ, which is often propagated through spam and phishing messages, is primarily used by cybercriminals to harvest banking information, such as login credentials, from a victim’s computer. Infected systems can also be used to engage in other malicious activities, such as sending spam or participating in distributed denial-of-service (DDoS) attacks.”

According to the FBI, GameOver Zeus can steal your username and passwords, and subsequently drains your bank account.

2. GameOver Zeus Can Be Removed By Virus Scanners

The video above gives you a detailed rundown of GameOver Zeus.

US CERT recommends the use of Symantec, Sophos, Heimdal, F-Secure, or Microsoft to identify and remove GameOver Zeus from an infected computer. By simply updating your trusted anti-virus software and running a scan, you should be protected.

3. Evgeniy Mikhailovich Bogachev Believed to Be Behind GameOver Zeus

The Verge reports that Evgeniy Mikhailovich Bogachev is the “mastermind” behind the malicious GameOver Zeus botnet network. It is believed that the botnet was responsible for stealing $100 million from people all over the world.

4. GameOver Zeus Has Been Linked to CryptoLocker

The Verge notes:

“The botnet also raised money through Cryptolocker an attack that would encrypt a computer’s hard drive, demanding a ransom to unlock the data. For those that didn’t pay, data-recovery costs reached as high as $80,000. Researchers say the botnet has been operational since October of 2011, but used a complex P2P mechanism to cover its tracks, making it difficult to track down before now.”

Cryptolocker is known to have affected tens of thousands of computers.

5. US, Italy, UK Among the Countries Most Affected by GameOver Zeus

Symantec has reported which countries have been most heavily targeted by the GameOver Zeus malware. The US and Italy lead, with the UAE, Japan, the United Kingdom, and India following close behind.

1 Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

1 Comment

Discuss on Facebook