Zeus botnet ‘nuked’ 100,000 Windows PCs
Why would a botnet controller order his bots to kill the operating systems of thousands of PCs?
 
Criminal controllers of a Zeus botnet server flicked a nuclear' switch that destroyed' the operating system of 100,000 affected computers, a researcher has claimed.
According to the Washington Post and his own security blog, Swiss IT expert Roman Hssy witnessed the Zeus Command & Control (C&C) server send out KOS (Kill Operating System) commands which would incapacitate and prevent the OS from loading.
The C&C botnet server hosted five different Zeus installations that controlled more than 100,000 computers that were located mainly in Poland and Spain.
Security expert Jozsef Gegeny said on the S21sec blog that banking trojans such as Zeus usually had this functionality, and and when Zeus' nuclear method was tested it resulted in the "blue screen of death".
He questioned why an attacker would want to take a victim's computer offline, and suggested that it was because a phishers might want to earn more time.
He said: "Taking the victim away from internet connection before the unwanted money transfer is realised and further actions could be taken."
Bruce Schneier, chief security technology officer for BT, said on his blog that he believed it could be sign that "botnet wars" were heating up.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
He said: "Botnet designers would rather destroy their networks than have them fall into 'enemy' hands."
- 
 AI layoffs could spark a new wave of offshoring AI layoffs could spark a new wave of offshoringNews Analysts expect a wave of rehiring next year in the wake of AI layoffs. That may sound like good news for workers, but it'll probably involve offshoring or outsourcing. 
- 
 Hackers are using these malicious npm packages to target developers Windows, macOS, and Linux systems Hackers are using these malicious npm packages to target developers Windows, macOS, and Linux systemsNews Security experts have issued a warning to developers after ten malicious npm packages were found to deliver infostealer malware across Windows, Linux, and macOS systems. 
- 
 Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up stingNews Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year. 
- 
 Horabot campaign targeted businesses for more than two years before finally being discovered Horabot campaign targeted businesses for more than two years before finally being discoveredNews The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular 
- 
 Brand-new Emotet campaign socially engineers its way from detection Brand-new Emotet campaign socially engineers its way from detectionNews This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros 
- 
 Microsoft says “it’s just too difficult” to effectively disrupt ransomware Microsoft says “it’s just too difficult” to effectively disrupt ransomwareNews The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy 
- 
 Beating the bad bots: Six ways to identify and block spam traffic Beating the bad bots: Six ways to identify and block spam trafficIn-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website 
- 
 Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia Ukraine's vigilante IT army now has a DDoS bot to automate attacks against RussiaNews The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders 
- 
 Microsoft's secure VBA macro rules already being bypassed by hackers Microsoft's secure VBA macro rules already being bypassed by hackersNews Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware 
- 
 Emotet infrastructure has almost doubled since resurgence was confirmed Emotet infrastructure has almost doubled since resurgence was confirmedNews Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation