

In addition to these commercial botnet kits based on ZeuS, there have also been variants of ZeuS that have not been marketed and offered for sale in the public domain. Both of these kits are sold through underground forums and provide customers with bug fixes to the original ZeuS codebase and with new features such as sandbox detection and video recording.
#Dirt jumper ddos tool kit code
In May 2011, the source code of ZeuS was leaked, which spawned two new botnet kits known as ICE IX and Citadel. Arguably the most popular DIY botnet kit is the ZeuS banking trojan, which first appeared in 2006. Nearly everything has a price: stolen credit cards, spam services, and do-it-yourself (DIY) botnet kits. The underground economy provides a marketplace for cybercriminals to buy and sell their products and services.

Over the past year, CTU researchers have tracked the tools, techniques, and modus operandi of the attackers behind the P2P version of ZeuS, and have gained a comprehensive view into the thriving underground economy.

One of the most significant developments since the leak of the ZeuS source code in May 2011 has been the introduction of a private peer-to-peer (P2P) version, first identified in October 2011, which removes the centralized command and control (C2) infrastructure previously required to push configuration files, updates, and collect information harvested from infected computers. The Dell SecureWorks Counter Threat Unit(TM) (CTU) research team continues to monitor the latest advancements to the ZeuS banking Trojan horse malware family. Author: Brett Stone-Gross, Dell SecureWorks Counter Threat Unit(TM) Threat Intelligence.
