The raid last week seized dozens of British, US and Ukrainians involved in Trojan attacks against major US banks. Criminals have stolen about $ 70 million from small businesses and other US organizations.
The Zeus Trojan is a highly configurable part of malware designed to steal personal information. They are for sale on a number of websites that cyber criminals collect and dozens of variants are on sale.
In particular, Fragus variant and exploit tools have helped cybercriminals easily find specific vulnerabilities on computers, such as operating systems or browsers. As a result, cyber criminals easily take control of legitimate websites and send web users there to download malicious software without them knowing it.
With an investment of about $ 2,500, cyber criminals can purchase versions of Zeus and Fragus to perform online fraudulent activities. Currently, criminals have used more sophisticated systems and data taken from the manufacturer (Russia) Mpack malicious code has infected more than 13% of computers in the US. More than 20% of computers in Japan and Germany have been infected when 'confronting' with Mpack and more than 50% of computers in Rome are also infected with this malicious code.
In addition, cybercriminals continue to use spamming tools to redirect users to phishing sites, as well as use affiliate programs to lead to exploited websites. Many large-scale criminal activities use 'mule-donkeys' to make money. These MULEs in countries are targeted by cyber criminals. They will help steal money and transfer it to cybercrime abroad. The US Federal Bureau of Investigation said the operation of Ukrainian Zeus has collected about 3,500 Mules in the United States.