2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.535
|View full text |Cite
|
Sign up to set email alerts
|

From ZeuS to Zitmo: Trends in Banking Malware

Abstract: Abstract. In the crimeware world, financial botnets are a global threat to banking organizations. Such malware purposely performs financial fraud and steals critical information from clients' computers. A common example of banking malware is the ZeuS botnet. Recently, variants of this malware have targeted mobile platforms, as The-ZeuS-in-the-Mobile or Zitmo. With the rise in mobile systems, platform security is becoming a major concern across the mobile world, with rising incidence of compromising Android dev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 12 publications
(31 reference statements)
0
22
0
Order By: Relevance
“…Actually, the strategy of used was only tested on a few APKs that are known to be malicious, unlike our paper that uses thousands of APKs. Finally, Etaher et al [15] report on the trends and development of Zeus by reviewing papers and reports about this major banking trojan. Unlike our paper, the analysis of [15] is based on literature review and not on analyzing APKs.…”
Section: Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Actually, the strategy of used was only tested on a few APKs that are known to be malicious, unlike our paper that uses thousands of APKs. Finally, Etaher et al [15] report on the trends and development of Zeus by reviewing papers and reports about this major banking trojan. Unlike our paper, the analysis of [15] is based on literature review and not on analyzing APKs.…”
Section: Prior Workmentioning
confidence: 99%
“…Many works on banking trojans focus on the desktop or Web browser domains [12], [16], [7], which are fundamentally different to defend than a mobile environment in terms of both static [4] and dynamic [38] analysis. There are some works which do focus specifically on ABTshowever they either assume post-mortem analysis of samples already known to be ABTs (e.g., [6], [11]) or conduct surveys without proposing a detection algorithm (e.g., [15]). To the best of our knowledge, this paper proposes the first system for both detection (Section 4) and characterization of ABTs (Section 6) and analyzes recent ABTs from 2016-2017 (Section 3).…”
Section: Introductionmentioning
confidence: 99%
“…Based on the Android botnet history, Eurograbber is one of the most notable and sophisticated attacks from Zeus malware family which occurred in 2012 where it infected more than 30,000 users and stole an estimated 36 million Euros [8][9]. The attack focused on Blackberry, Symbian, and Windows users.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[40], [41]), DDoS (Distributed Denial of Service) attacks, spoofing, phishing, pharming, SSL/TLS attacks and so on, are considered.…”
Section: The Ahp Model For Evaluation Of Online Transaction Systemsmentioning
confidence: 99%