Detected 64-bit ZeuS banking trojan using Tor network

Security researchers at Kaspersky Lab have detected a 64-bit Zeus banking trojan version enhanced with communication capability on the Tor network.

Is Zeus banking trojan dead? Absolutely no! Periodically security experts found new a variant that includes new features to make it more resilient and able to spread itself via social networks. Last variant was detected by researchers at Kaspersky Lab who discovered a 64-bit Zeus banking Trojan.

The instance detected using web injects to steal banking credentials, it is also able to steal digital certificates and implements a keystrokes feature.

The authors, following a recent trend, have also implemented a communication mechanism with C&C server over the Tor network to make hard for law enforcement and security firms its tracking.

The 64-bit version of Zeus banking trojan executes Tor component starting the svchost application in suspended mode and then injecting the Tor code into that process running it in stealth mode. Malicious traffic it that routed through TCP port 9050 and the stolen data are sent to the onion domain with address egzh3ktnywjwabxb[.]onion.

Zeus banking trojanZeus banking trojan

The Zeus banking trojan has maintained its way to steal user’s credentials, it still implements a classic man in the browser attack hooking into a user’s browser via a number of malicious Web injects that trigger when a victim accesses to its online banking account. Zeus banking trojan is able to capture the user’s credentials and sends them to the C&C server.

The 64-bit Zeus banking Trojan was expecting, but it is considered in advance because less than 1% of IE users run 64-bit OS version and anyway most of them running 32-bit browsers.

“That’s because cybercriminals don’t actually need a 64-bit version. ZeuS is mostly intended to intercept data passing through browsers, and modify that data allowing the operator to steal information related to online banking, to wire transactions or to cover his tracks. But nowadays people still use 32-bit browsers – even on 64-bit operating systems. So, 32-bit versions of ZeuS have been sufficient to keep the thieves satisfied with their earnings.” states the blog post written by Dmitry Tarakanov

The researcher believes that the 64-bit Zeus banking Trojan is more a marketing action that a real need for cybercrime ecosystem.

“Support for 64-bit browsers—a great way to advertise the product and to lure buyers—the botnet herders.”

The 64 bit variant of the popular Zeus malware is anyway considerable as a natural evolution of the malicious agent that has accelerated since his code was publicly released in 2011.

a pure 64-bit Zeus does finally exist, and we can conclude that a new milestone in the evolution of Zeus has been reached,” Tarakanov said.

Tarakanov revealed that the Kaspersky Lab team spotted the 64-bit Zeus sample in June and that the compile date of the source code was April 29th.

The new version of the Zeus banking trojan is able to trigger its execution after one program within a list of 100 predefined application is started.

“There are different types of programs, but all of them contain valuable private information that cybercriminals would love to steal—login credentials, certificates and so on,”  “So when operating inside these programs, Zeus is able to intercept and forward a lot of valuable information to the botnet operator.”

Another peculiarity of the malware is that it instantiates a hidden service that creates a configuration file for any victims that includes unique private key for the service and an exclusive domain, the feature allows the botmaster to control the architecture via Tor.

Zeus banking trojan and alive and is in excellent health!

 

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  Zeus Banking Trojan, malware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited

A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…

8 hours ago

A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by…

13 hours ago

Texas Department of Transportation (TxDOT) data breach exposes 300,000 crash reports

Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…

24 hours ago

SAP June 2025 Security Patch Day fixed critical NetWeaver bug

SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…

1 day ago

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws…

1 day ago

Mirai botnets exploit Wazuh RCE, Akamai warned

Mirai botnets are exploiting CVE-2025-24016, a critical remote code execution flaw in Wazuh servers, Akamai…

1 day ago