The most widespread botnet in history, ZeuS is a Trojan horse that infiltrates computers in order to steal data by logging keystrokes and spread copies of itself to other devices via instant messaging and e-mail messages. Computers infected by a ZeuS variant can be controlled by the attacker and monitored for keystrokes in order to gain access to online accounts and other sensitive data.
More than 50,000 variants of the ZeuS Trojan have been recognized since ZeuS made its first known appearance in 2007. The most prolific period for ZeuS came in 2009 and 2010, with some security reports estimating as many as 3.6 million ZeuS-infected computers in the United States alone during that time.
Several mobile botnet variants of the ZeuS Trojan have surfaced more recently, with some targeting Google Android phones while others attack Blackberry devices, Symbian phones, or Windows Mobile phones. These variants are considered part of the Zitmo family of mobile malware and are designed to steal the mobile transaction authentication numbers that banks use to strengthen security for logging in to online accounts.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
Webopedia's student apps roundup will help you to better organize your class schedule and stay on top of assignments and homework. Read More »List of Free Shorten URL Services
A URL shortener is a way to make a long Web address shorter. Try this list of free services. Read More »Top 10 Tech Terms of 2015
The most popular Webopedia definitions of 2015. Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »