The money is then transferred to a fraudulent company in which the money disappears. It is projected that 70+ million was stolen and over 100 people were arrested in connection with this scheme. This virus was able to infect up to 3.6 million PCs in the U.S. alone. It wreaked havoc in the online community. What made it even more potent was that the source code for this malware was made available in 2011, which allowed for anyone to modify and use in a malicious way. The virus is able to replicate itself by finding FTP accounts on infected machines and allowed it to modify a high traffic website. The infected website would direct the visitor to install malicious software. The software would test the unsuspecting visitor’s computer for vulnerability. It would then try to find any form of credentials and repeat the process while sending information it has found to the distributing host. This virus was able to spread through the downloading of freeware and shareware. It also found its way through spam campaigns and drive-by downloads. Zeus Trojan was flexible enough to be spread through email and compromising links. As a virus, Zeus was very difficult to identify. It used stealth
The money is then transferred to a fraudulent company in which the money disappears. It is projected that 70+ million was stolen and over 100 people were arrested in connection with this scheme. This virus was able to infect up to 3.6 million PCs in the U.S. alone. It wreaked havoc in the online community. What made it even more potent was that the source code for this malware was made available in 2011, which allowed for anyone to modify and use in a malicious way. The virus is able to replicate itself by finding FTP accounts on infected machines and allowed it to modify a high traffic website. The infected website would direct the visitor to install malicious software. The software would test the unsuspecting visitor’s computer for vulnerability. It would then try to find any form of credentials and repeat the process while sending information it has found to the distributing host. This virus was able to spread through the downloading of freeware and shareware. It also found its way through spam campaigns and drive-by downloads. Zeus Trojan was flexible enough to be spread through email and compromising links. As a virus, Zeus was very difficult to identify. It used stealth