GameOver Zeus, or GOZ, initially spread via a malicious spam and phishing campaign that sent out e-mails appearing to come from reputable organizations such as the Federal Reserve Bank, the Federal Deposit Insurance Corporation (FDIC) and the National Automated Clearing House Association (NACHA).
A link in these e-mails, if clicked upon, would open a fraudulent website where the GOZ malware would then be downloaded and run on the system, subsequently opening the infected computer for financial information and login credentials to be obtained.
Key Differences of GameOver Zeus vs. ZeuS
A key distinction between GameOver Zeus and the original ZeuS variants is that GOZ featured the additional capability to initiate denial-of-service (DoS) attacks via botnets as a form of subterfuge. A second difference is that the GameOver Zeus malware employed a P2P architecture for the operation of the malware, making it more difficult for authorities to track and shut down the cybercriminals’ activities.
Authorities were able to put an end to both GameOver Zeus and the CryptoLocker ransomware in mid-2014 following a multi-continent collaboration between law enforcement agencies, particularly the European Cybercrime Center (EC3), and security researchers to identify and shut down the GOZ botnet servers and infrastructure.
This effort followed two unsuccessful attempts in 2012 to disrupt and put an end to the GameOver Zeus infrastructure.
Also see The Difference Between a Virus, Worm and Trojan Horse in the Did You Know? section of Webopedia.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »List of Well-Known TCP Port Numbers
Port numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of port numbers are specified in... Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »