• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Is Gameover Zeus on the rise again?

By Guest Authors

Back in June, the United States Department of Justice and other law enforcement authorities were able to take over the network of Gameover Zeus botnets in a spate of massive crackdown. The network then consisted of up to a million infected computers. Now, security experts claim that cyber criminal groups are working to build up the botnet again from scratch.

While other forms of cybercrime never had the chance to regain momentum after a comprehensive takedown by authorities, the Gameover Zeus rebuilding showed some successful trials, according to security experts. These botnets are responsible for the wave of spam messages that hit our emails.

gameover-zeus

What could contribute to this success is the fact that the first Gameover Zeus botnet was created with a modification of a certain Zeus Trojan version. Creators of the Gameover Zeus then built a command-and-control server with a peer-to-peer infrastructure in order to make the botnet flexible to attempts of a takedown.

That is why a few months after the botnet network was busted, a fresh variant of the Gameover Zeus is spotted in the wild by security researchers, representing a rise of what most in the security community believed to have gone away forever. This time, the variant is said to be using various domain names instead of a peer-to-peer-based command-and-control architecture.

The domain generation algorithm that has been seen in use works to produce thousands of new and random domain names at a time and communicate with the botnets. Equipped with the knowledge of how the domain generation algorithm operates, hackers are able to anticipate the domain names that a particular malware will target on a given time by identifying that computer in advance and assigning a certain server to contact it before the infection is carried out.

In this case, security experts will really have a hard time stopping this network of botnets from rising again since the domains are being generated into unique ones each time. And that process is continuous as long as necessary. Unless the algorithm will be cracked, which is almost improbable. But if that can be done, then researchers will be able to determine the total number of infected computers.

Reports had it that two new Gameover Zeus configurations use different domain generation algorithms that create thousands of domain names every day. In mid July, the number of victims of this botnet grew to up to 500, and in just a matter of days the number increased to nearly 9,000.

According to reports, the new variant of Gameover Zeus botnet is in the process still of rebuilding.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Kodak Luma 500 Review – An Impressive Mini Projector with Native 1080p Resolution

Hohem iSteady V3 Ultra AI Gimbal Review – Smartphone Videography with Advanced AI and Control

iKoffy EdiBot Food Printer Review – Can It Replace Latte Art?

DYMESTY AI Glasses Review – Could These Be Your Next Wearable?

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • iPhone Air Model Number A3260, A3516, A3517, A3518 Differences
  • iPhone 17 Pro Max Model Number A3257, A3525, A3526, A3527 Differences
  • iPhone 17 Pro Model Number A3256, A3522, A3523, A3524 Differences
  • Why Tesla Displays Go Black – And How It Was Fixed?

Copyright © 2025 · All Rights Reserved