GAMEOVER ZEUS AND CRYPTOLOCKER: WHAT DOES THIS MEAN FOR BANKS? - Banking news and analysis from Global Banking & Finance Review
Banking

GAMEOVER ZEUS AND CRYPTOLOCKER: WHAT DOES THIS MEAN FOR BANKS?

Published by Gbaf News

Posted on June 11, 2014

4 min read

· Last updated: January 15, 2019

Add as preferred source on Google

Andy Morris, Solutions Lead, ACI Worldwide

Coordinated Response to GameOver Zeus and CryptoLocker

If you’ve been paying attention to the news this week, you will have seen the start of the biggest co-ordination between the NCA and the FBI in an effort to stop one attack; GameOver Zeus and CryptoLocker. However, whilst the focus has been on the crackdown of the criminal gangs behind the GameOverZeus and CryptoLocker viruses, for many it is too late as there are already hundreds of thousands of machines infected. It’s been estimated that the financial loses will reach up to $100M, but this could jump dramatically as malware lays in wait ready for its next attack.

Andy Morris

Andy Morris

How GameOver Zeus Targets Banks

GameOver Zeus is a botnet, designed to steal banking and other credentials from the computers it has infected, usually via a link or attachment in an email. But, in the event that the infected computer is not able to give a substantial financial reward, it will pull in help from another type of malware called CryptoLocker. Instead of stealing financial data, it encrypts all the files on the infected machine and demands a ransom of one bitcoin (roughly around £300-£400).

While the scale of this operation is unprecedented, we must remember that cyber criminals are always looking for their next way to exploit the system and are constantly changing their tactics. With this in mind and the risk of huge cost implications, banks have to remain vigilant in their detection and prevention schemes when it comes to dealing with abnormal activity originating from infected machines. There are simple techniques that can be crucial to stopping criminal activity, such as monitoring for new payees, random faster payments, CHAPS or wire requests, and even online purchases that are not part of the normal transaction behaviour of a customer.

Balancing Fraud Detection and Customer Experience

Some of the layered detection and challenge response techniques that banks typically use to help identify any irregular activity can impact on the customer experience, so it is a difficult balance for banks to get right. There is no single solution that banks use, but most will include one-time passcodes for logging onto internet banking applications or when making payments to new payees. Banks can use security tokens supplied to customers at enrolment, via SMS messages, or even give customers a card authentication device.

Stealth Security Techniques in Banking

Some banks take a more stealthlike approach and adopt technologies and techniques that find a secure link between the bank and the customer’s device. For example, data can be gathered and used to form a DNA fingerprint that banks check current activity against. Where anomalies are identified, the payment could be declined or the customer is subjected to stronger authentication and verification processes before the payment is made.

The Role of Bank Customers in Security

However, it isn’t just the banks that have the responsibility of keeping their customers money secure. Customers also have a role to play. For them, it is essential that they keep an eye on their accounts and flag to the bank any activity that appears abnormal and immediately report transactions they have not made. Simple things like keeping anti-virus, software and operating systems up-to-date will help add that extra level of protection – many businesses still use Windows XP, which has been without security support since April this year.

Ultimately, banks and customers have to work together to help stop bank accounts being wiped clean by criminals. It’s a two-way relationship; banks must be sure that they are doing everything possible to avoid criminals stealing the money of their customers, while customers need to be better equipped to deal with criminals all over the world trying to gain access to their personal details.

Key Takeaways

  • GameOver Zeus steals banking credentials via a P2P botnet and will deploy CryptoLocker ransomware if initial theft fails.
  • The multinational takedown (‘Operation Tovar’) disrupted the infrastructure of both GameOver Zeus and CryptoLocker through FBI and NCA coordination.
  • Banks need layered detection: anomaly monitoring, device fingerprinting, one-time codes and stealth authentication for payments.
  • Customers must update antivirus/OS, monitor transactions, and report suspicious activity promptly.
  • A collaborative defence between banks and customers is essential to mitigate financial and security risks.

References

Frequently Asked Questions

What are GameOver Zeus and CryptoLocker?
GameOver Zeus is a decentralized botnet malware that steals banking credentials, while CryptoLocker is ransomware that encrypts files and demands ransom, often deployed when the botnet fails to steal data ([fbi.gov](https://www.fbi.gov/news/stories/gameover-zeus-botnet-disrupted?utm_source=openai)).
What was Operation Tovar?
Operation Tovar was an international law‑enforcement operation led by the FBI and UK NCA to disrupt the GameOver Zeus botnet and CryptoLocker ransomware infrastructure ([shadowserver.org](https://www.shadowserver.org/news/gameover-zeus-cryptolocker/?utm_source=openai)).
How much damage did these threats cause?
GameOver Zeus infected between 500,000 and 1 million computers worldwide and is blamed for over $100 million in losses; CryptoLocker infected over 200,000 systems and collected tens of millions in ransom ([fbi.gov](https://www.fbi.gov/contact-us/field-offices/omaha/news/press-releases/u.s.-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware-charges-botnet-administrator?utm_source=openai)).
What measures can banks take to protect customers?
Banks can use layered detection including monitoring for new payees, unusual payments, one‑time passcodes, device fingerprinting for anomaly detection, and challenge‑response protocols ([ibtimes.co.uk](https://www.ibtimes.co.uk/how-banks-customers-can-tackle-gameover-zeus-cryptolocker-viruses-1451460?utm_source=openai)).
What should customers do to stay safe?
Customers should keep antivirus and OS updated, monitor account activity, report suspicious transactions promptly, and comply with bank alerts and authentication protocols ([ibtimes.co.uk](https://www.ibtimes.co.uk/how-banks-customers-can-tackle-gameover-zeus-cryptolocker-viruses-1451460?utm_source=openai)).

Tags

Related Articles

More from Banking

Explore more articles in the Banking category