Categories: Cyber CrimeMalware

Bad Actors rebuild from scratch the Gameover Zeus Botnet

Experts at Arbor networks discovered a new variant of GameOver Zeus Botnet which implement DGA scheme.

Recently law enforcement agencies have taken down the GameOver Zeus botnet with a multinational effort, but a few weeks later, researchers at Seculert spotted a new variant in the wild, which implements a domain generation algorithm.Investigators from FBI and Europol coordinated their activities to seize servers and domains used by bad actors, that authorities discovered was also used to distribute CryptoLocker ransomware.

Experts at Seculert noticed that the DGA scheme allowed the botnet to pass from 1,000 new bots a week, to 1,000 a day on average.  According to experts at Arbor networks, cybercriminals behind the malicious infrastructure have renewed it. As explained by Dave Loftus, security analyst at Arbor Networks until law enforcement arrest the member of the gang behind the GameOver Zeus botnet, the growth of the malicious network will continue.

GameOver Zeus was involved in financial frauds, the malware is able to steal banking credentials from infected machines.

The researchers identified, thanks to sinkhole analysis, at least 12,353 unique IP addresses worldwide belonging to the new GameOver Zeus botnet.

Between July 18 and July, the experts at Arbor Networks used five sinkholes to collect the connection of malicious instances of GameOver Zeus worldwide.

“The steady growth of newGOZ demonstrates the resilience of the attackers to keep their botnet active,” “While previous efforts to disrupt the botnet have been successful, these disruptions are usually only temporary. Until law enforcement can successfully prosecute the individuals behind the botnet, we expect the growth of newGOZ to continue well into the future.” said Loftus.

GameOver Zeus botnet implements a peer to peer communication protocol that makes it hard to detect and more resilient to the mitigation action of law enforcement and security firms for the lack of a centralized control. The new GameOver Zeus no longer utilizes the P2P protocol but but generates a series of domain with a DGA algorithm, this makes easy for bad actors to quickly rebuilding their malicious infrastructure even more law enforcement take down it.

“Our sinkhole data reinforces steady growth of new Gameover Zeus since we started tracking the botnet,”.

Loftus referencing the data provided by Malcovery firm, which observed in mid-July hat the Cutwail botnet began distributing new GameOver Zeus via spam campaigns, said:

“Our sinkhole data provides a first look at how successful these spam campaigns have been. Between July 21-25, we observed a 1,879 percent increase, confirming that the cybercriminals are actively rebuilding their botnet from scratch.”

The most infections were in the United States and India, Internet service providers, telecommunications and education markets were most affected.

Pierluigi Paganini

(Security Affairs – GameOver Zeus, cybercrime)  

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

29 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

This website uses cookies.