Yes it has been used to add clones to DoS bots. But it incorporates a rootkit.
"The DIY â€œexe builderâ€ for the Zeus Trojan can be bought online for just $4,000. Each Zeus Trojan it builds incorporates a kernel level rootkit, which means it can hide from even the most advanced security"Yes, the Zeus package is not the most complex rootkit but it is widely distributed.
I know it is available for free, but it really doesn't help to publish that information. Being Readily available may persuade "Nefarious users" into incorporating some of it features. This is far from ideal. A prudent security posture would indicate the facts but leave out enough details so it can not be incorporated by less skilfull individuals. There is enough problems with malware already
Those that donâ€™t want to sell malware sell themeans to help build malware:
55% of Zeus‐infected systems had up‐to‐date AV
• Attacker can search collected data for cookies, files, contents of HTTP requests, FTP logons, etc.
• The files collected by Zeus were typically stored on compromised servers
• Sold for as low as $250 (with support!)
• One variant ran on Amazonâ€™s EC2 cloud
How do they get by us?
Golden‐ball syndrome â€“ Prey on our weaknesses!
Its funny to me how advertisers these days use the very tactics that early hackers used to gather info. Its all good now though. Thanks patriot act.
What are some tell tale signs of a rootkit infection and what are the weaknesses being used by predators. How does one differentiate between legit BS advertising and illegal infiltration from rootkits. It seems all so blurred at the moment.