Jabber Zeus
   HOME

TheInfoList



OR:

Jabber Zeus was a
cybercriminal Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may explo ...
syndicate and associated
Trojan horse In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
created and run by hackers and
money launderer Money laundering is the process of illegally concealing the origin of money obtained from illicit activities (often known as dirty money) such as drug trafficking, sex work, terrorism, corruption, and embezzlement, and converting the funds into ...
s based in Russia, the United Kingdom, and Ukraine. It was the second main iteration of the
Zeus Zeus (, ) is the chief deity of the List of Greek deities, Greek pantheon. He is a sky father, sky and thunder god in ancient Greek religion and Greek mythology, mythology, who rules as king of the gods on Mount Olympus. Zeus is the child ...
malware and
racketeering Racketeering is a type of organized crime in which the perpetrators set up a coercion, coercive, fraud, fraudulent, extortionary, or otherwise illegal coordinated scheme or operation (a "racket") to repeatedly or consistently collect a profit. ...
enterprise, succeeding Zeus and preceding
Gameover Zeus GameOver ZeuS (GOZ), also known as peer-to-peer (P2P) ZeuS, ZeuS3, and GoZeus, is a Trojan horse (computing), Trojan horse developed by Russian cybercriminal Evgeniy Bogachev. Created in 2011 as a successor to Jabber Zeus, another project of Bog ...
. Jabber Zeus was operational from around 2009 until 2010. The crew, consisting of nine core members, sent
spam emails Email spam, also referred to as junk email, spam mail, or simply spam, refers to unsolicited messages sent in bulk via email. The term originates from a Monty Python sketch, where the name of a canned meat product, "Spam," is used repetitively, m ...
containing the Trojan to small businesses. The Trojan would send the victim's banking information, including one-time passwords, in real-time, using the
Jabber To jabber means to babble incoherently. Jabber may also refer to: * The original name of the Extensible Messaging and Presence Protocol (XMPP), the open technology for instant messaging and presence * Jabber.org, the public, free instant messag ...
protocol, to the criminals, who would use the information to drain the victim's bank account of funds and launder it using a massive network of
money mule A money mule, sometimes called a "smurfer", is a person who transfers money acquired illegally, such as by theft or fraud. Money mules transfer funds in person, through a courier service, or electronically, on behalf of others. Typically, the mule ...
s, where it would eventually reach the group. The malware may also have been used for espionage. In September 2010, the Trojan was updated to include several other capabilities designed to enhance its security. Between September 30 and October 1 of 2010, several key members and money mules for the group were arrested in a joint operation between the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
, the Russian
Federal Security Service The Federal Security Service of the Russian Federation €Π‘Π‘, Π€Π‘Π‘ России (FSB) is the principal security agency of Russia and the main successor agency to the Soviet Union's KGB; its immediate predecessor was the Federal Counterin ...
, the
Security Service of Ukraine The Security Service of Ukraine ( ; abbreviated as SBU [] or SSU) is the main Internal security, internal security agency of the Government of Ukraine, Ukrainian government. Its main duties include counter-intelligence activity and combati ...
, and police agencies in the United Kingdom and the Netherlands. Although the individuals arrested in Ukraine were quickly released due to core member Vyacheslav Penchukov's government connections and no conspirators were arrested in Russia, the group was effectively shut down by the arrests. A year later, in September 2011, the group and malware would re-emerge as Gameover Zeus.


Organization and activity


Core members

An indictment filed in the District of Nebraska on August 22, 2012, listed nine core Jabber Zeus members: * Evgeniy Bogachev, alias "lucky12345", a resident of Russia. Bogachev was the primary developer of the Jabber Zeus malware and the preceding
Zeus Zeus (, ) is the chief deity of the List of Greek deities, Greek pantheon. He is a sky father, sky and thunder god in ancient Greek religion and Greek mythology, mythology, who rules as king of the gods on Mount Olympus. Zeus is the child ...
Trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * '' Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 18 ...
creation kit. * Vyacheslav Penchukov, aliases "tank" and "father", a resident of Ukraine. Penchukov coordinated the movement of stolen bank credentials, as well as the
money mule A money mule, sometimes called a "smurfer", is a person who transfers money acquired illegally, such as by theft or fraud. Money mules transfer funds in person, through a courier service, or electronically, on behalf of others. Typically, the mule ...
network. He was the first person to be notified by the malware of an infection and the only member of the crew to communicate with Bogachev. * Yevhen Kulibaba, alias "jonni", a resident of the United Kingdom. Kulibaba was the alleged ringleader of the group, but this is disputed by
Brian Krebs Brian Krebs (born 1972) is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals.Perlroth, Nicole.Reporting From the Web's Underbelly. ''The New York Times''. Retrieved February 2 ...
and Patrick O'Neill, who state that Penchukov or Bogachev, respectively, was the leader. * Yuriy Konovalenko, alias "jtk0", a resident of the United Kingdom. Konovalenko served as Kulibaba's right-hand man in the UK, providing him with banking details from victims and money mules, and collecting data from his co-conspirators. * Ivan Klepikov, aliases "petr0vich" and "nowhere", a resident of Ukraine. Klepikov was a
system administrator An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
for the crew. * Alexey Bron, alias "thehead", a resident of Ukraine. Bron managed the transfer of funds using the online payment service
WebMoney WebMoney is an online payment settlement system established in Russia in 1998. It is one of the largest electronic payments processors in Russia by number of users, with the company reporting 45 million registered accounts and 300,000 active we ...
. * Alexey Tikonov, alias "kusanagi", a resident of Russia. Tikonov was a coder for the criminal enterprise. *
Maksim Yakubets Maksim Viktorovich Yakubets (Russian: Максим Π’ΠΈΠΊΡ‚ΠΎΡ€ΠΎΠ²ΠΈΡ‡ Π―ΠΊΡƒΠ±Π΅Ρ†) is a Russian computer expert and alleged computer hacker. He is alleged to have been a member of the Evil Corp, Jabber Zeus Crew, as well as the alleged lead ...
, alias "aqua", a resident of Russia. Yakubets managed and recruited money mules for the group. * "mricq", real name unknown, a resident of Ukraine. "mricq" was a coder for the crew. The indictment charged the core members with
bank A bank is a financial institution that accepts Deposit account, deposits from the public and creates a demand deposit while simultaneously making loans. Lending activities can be directly performed by the bank or indirectly through capital m ...
and
computer fraud Computer fraud is the use of computers, the Internet, Internet devices, and Internet services to defraud people or organizations of resources. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act (CFAA ...
,
racketeering Racketeering is a type of organized crime in which the perpetrators set up a coercion, coercive, fraud, fraudulent, extortionary, or otherwise illegal coordinated scheme or operation (a "racket") to repeatedly or consistently collect a profit. ...
, and identity theft.


''Modus operandi'' and the Jabber Zeus malware

The Jabber Zeus crew operated by distributing, usually via
spam emails Email spam, also referred to as junk email, spam mail, or simply spam, refers to unsolicited messages sent in bulk via email. The term originates from a Monty Python sketch, where the name of a canned meat product, "Spam," is used repetitively, m ...
, and installing the namesake malware onto victims' computers, then using it to gain access to their bank accounts. Money would be stolen from the accounts and transferred to a network of money mules who would
launder Launder or Launders may refer to: * Launder (surname) * Launders (surname) See also

* Laundering (disambiguation), several types of washing, literally or metaphorically {{Disambiguation ...
the money before it eventually reached the criminals. The money mules were usually unaware that they were handling stolen finances. The FBI claimed in 2010 that more than 3,500 such money mules existed. The Jabber Zeus crew primarily targeted small businesses. In 2010, investigators estimated that at minimum, $70 million had been stolen by the criminals, with the true number being much higher. The crew's activity dates back to at least 2009. The initial version of the Jabber Zeus malware was built from the standard Zeus kit, then known as Zeus 2. The malware was mainly distinguished from other Zeus variants by a modification allowing it to send victims' banking credentials, particularly one-time passwords, to the criminals as soon as the victim logged in. The message was sent via the
Jabber To jabber means to babble incoherently. Jabber may also refer to: * The original name of the Extensible Messaging and Presence Protocol (XMPP), the open technology for instant messaging and presence * Jabber.org, the public, free instant messag ...
protocol, hence the name "Jabber Zeus". In September 2010, Bogachev provided the crew with a specialized version of the malware, known as ZeuS 2.1.0.X. This contained other unique capabilities, including a
domain generation algorithm Domain generation algorithms (DGA) are algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers. The large numb ...
to prevent shutdown attempts,
regular expression A regular expression (shortened as regex or regexp), sometimes referred to as rational expression, is a sequence of characters that specifies a match pattern in text. Usually such patterns are used by string-searching algorithms for "find" ...
support, and the ability to infect files. The malware was additionally protected by an encryption key that required Penchukov to purchase each copy individually at a cost of $10,000 per copy. Infected machines, as with other Zeus variants, formed a
botnet A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, sp ...
that could be accessed and controlled by the group. Analysis of several Zeus variants, including Jabber Zeus, uncovered attempts by this botnet to search for secret and sensitive information in Georgia,
Turkey Turkey, officially the Republic of TΓΌrkiye, is a country mainly located in Anatolia in West Asia, with a relatively small part called East Thrace in Southeast Europe. It borders the Black Sea to the north; Georgia (country), Georgia, Armen ...
, and Ukraine, leading to suspicion that the malware was additionally used for espionage on behalf of Russia. On September 11, 2011, the Jabber Zeus malware was updated to
Gameover Zeus GameOver ZeuS (GOZ), also known as peer-to-peer (P2P) ZeuS, ZeuS3, and GoZeus, is a Trojan horse (computing), Trojan horse developed by Russian cybercriminal Evgeniy Bogachev. Created in 2011 as a successor to Jabber Zeus, another project of Bog ...
, the final known variant of Zeus developed by Bogachev.


Conflict with Brian Krebs

On July 2, 2009, the ''
Washington Post ''The Washington Post'', locally known as ''The'' ''Post'' and, informally, ''WaPo'' or ''WP'', is an American daily newspaper published in Washington, D.C., the national capital. It is the most widely circulated newspaper in the Washington m ...
'' published a story by
Brian Krebs Brian Krebs (born 1972) is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals.Perlroth, Nicole.Reporting From the Web's Underbelly. ''The New York Times''. Retrieved February 2 ...
describing the Jabber Zeus crew's theft of $415,000 from the government of
Bullitt County, Kentucky Bullitt County is a county located in the north central portion of the U.S. state of Kentucky. As of the 2020 census, the population was 82,217. Its county seat is Shepherdsville. The county was founded in 1796. Located just south of the cit ...
. Shortly after, Krebs was contacted by an individual who had hacked into the crew's Jabber instant message server and was able to read private chats between them. The members of the syndicate were also aware of the ''Washington Post'' story, and expressed frustration that their exploits were now public information; in a chat between Penchukov and Bogachev, the former claimed that "now the entire USA knows about Zeus", to which Bogachev concurred: "It's fucked." Members of the crew would keep up with Krebs's writing thereafter. Krebs also gained access to the messages sent to the money mules by the group, exploiting a security flaw in the money mule recruitment websites that allowed an automated scraper to grab messages sent to any other user; users could, after logging in, read messages to other users by changing a number in the URL. With this access, he was able to prevent and write about several breach attempts by the crew by contacting victim businesses. On December 13, 2009, the crew discovered that Krebs had been let go by the ''Washington Post'' prior to this information becoming public, and celebrated the event, with a money mule recruiter hoping for an eventual confirmation of the rumor: "Good news expected exactly by the New Year!"


Investigation


Operation Trident Breach

In September 2009, the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
(FBI) obtained a search warrant for a server in New York that was suspected of being tied to the Jabber Zeus enterprise. The server was discovered to contain the crew's chats, which the FBI began monitoring. Shortly thereafter, they began to share information from the chats with Russia's
Federal Security Service The Federal Security Service of the Russian Federation €Π‘Π‘, Π€Π‘Π‘ России (FSB) is the principal security agency of Russia and the main successor agency to the Soviet Union's KGB; its immediate predecessor was the Federal Counterin ...
(FSB) and the
Security Service of Ukraine The Security Service of Ukraine ( ; abbreviated as SBU [] or SSU) is the main Internal security, internal security agency of the Government of Ukraine, Ukrainian government. Its main duties include counter-intelligence activity and combati ...
(SBU). Penchukov was identified around this time; he had sent a message on July 22 containing his newborn daughter's name and weight, which was correlated with Ukrainian birth records. In April 2010, the crew became aware that they were being monitored, possibly tipped off by a corrupt SBU agent, but continued to send messages using the compromised server for a time. The FBI organized Operation Trident Breach, a collaboration between the FBI, FSB, SBU, and police agencies in the UK and the Netherlands, in 2010 to capture the leaders of the Jabber Zeus group. The operation was mainly coordinated in June 2010, at a house owned by SBU director Valeriy Khoroshkovskyi, with the agencies planning to arrest the suspects on September 29 of that year. However, the operation was pushed back several times, eventually to October 1, at the request of the SBU, by which point they had lost track of Penchukov. Penchukov had been tipped off about the upcoming operation and had gone into hiding. Between September 30 and October 1, 2010, Operation Trident Breach was executed, resulting in the arrest of 39 US citizens, 20 UK residents, and five Ukrainians. There were no arrests in Russia. The operation had started a day early in response to reports that Penchukov and other suspects had been tipped off. Among the arrested were Kulibaba and Konovalenko, who were convicted in the UK in 2011, then extradited to the US in 2014, and Klepikov, who was not extradited due to the Ukrainian constitution's prohibition on extraditing citizens and eventually let go along with the other arrested Ukrainians. Penchukov, leveraging his connections with Ukrainian president
Viktor Yanukovych Viktor Fedorovych Yanukovych (born 9 July 1950) is a Ukrainian politician who served as the fourth president of Ukraine from 2010 to 2014. He also served as the prime minister of Ukraine several times between 2002 and 2007 and was a member of t ...
and local authorities in his hometown of
Donetsk Donetsk ( , ; ; ), formerly known as Aleksandrovka, Yuzivka (or Hughesovka), Stalin, and Stalino, is an industrial city in eastern Ukraine located on the Kalmius River in Donetsk Oblast, which is currently occupied by Russia as the capita ...
, managed to get the charges against himself dropped. Despite the escape of several key members, the syndicate was disrupted and effectively shut down by the operation.


Identification of Bogachev and Yakubets

Bogachev and Yakubets's identities were not publicly known until after Jabber Zeus dissolved and reformed into Gameover Zeus in the wake of the arrests; they were only known by their pseudonyms, "lucky12345" and "aqua", respectively, as members of the group. Bogachev was also known as "Slavik", though he was not identified as such in the 2012 indictment. Bogachev was identified in 2014, after a source pointed investigators working for Fox-IT, a security research company, to one of his email addresses. Although Bogachev had used a
VPN Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not c ...
to administer the Gameover Zeus botnet, he had used the same VPN to access his personal accounts, allowing investigators, who had previously penetrated the botnet's command servers, to tie the system to Bogachev. Yakubets was formally identified in a criminal complaint on November 14, 2019, based on evidence collected from 2010 to 2018. An attempt to determine who rented the Jabber server the FBI breached in 2009 uncovered no leads, as the server was rented under a false name. On July 9, 2010, US authorities sent a mutual legal assistance request to Russia for information regarding "aqua"; Russian authorities responded with evidence that "aqua" was Yakubets, obtained from his email account, which used the "aqua" pseudonym, but contained emails identifying him by his real name, as well as his address. On December 25, 2012, a woman who was found to be living at Yakubets's address identified her spouse as Yakubets in a visa application and listed a boy traveling with her as her son. The child's name was found in intercepted chat logs between Yakubets and Penchukov from 2009. On March 19, 2018, Microsoft, following a court order, provided records connecting Yakubets's
Skype Skype () was a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for IP-based videotelephony, videoconferencing and voice calls. It also had instant messaging, file transfer, ...
account and his email. On August 12, 2018, Yakubets's now-ex-wife and her son applied for another visa, again listing Yakubets as the woman's ex-husband.


Arrest of Penchukov

Penchukov was arrested in
Geneva Geneva ( , ; ) ; ; . is the List of cities in Switzerland, second-most populous city in Switzerland and the most populous in French-speaking Romandy. Situated in the southwest of the country, where the RhΓ΄ne exits Lake Geneva, it is the ca ...
, Switzerland, on October 23, 2022, and his extradition to the United States was granted on November 15. His arrest was given by
CNN Cable News Network (CNN) is a multinational news organization operating, most notably, a website and a TV channel headquartered in Atlanta. Founded in 1980 by American media proprietor Ted Turner and Reese Schonfeld as a 24-hour cable ne ...
writer Sean Lyngaas and Krebs as an example of the opportunities to arrest cybercriminals opened up by the
Russian invasion of Ukraine On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...
as they flee the country for their own safety. Penchukov signed a
plea deal A plea bargain, also known as a plea agreement or plea deal, is a legal arrangement in criminal law where the defendant agrees to plead guilty or no contest to a charge in exchange for concessions from the prosecutor. These concessions can include ...
on February 15, 2024, and was sentenced to nine years in prison and a fine of more than $73 million on July 11.


See also

*
List of computer criminals Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks. Computer crime can be broadly defined as criminal activity involving information technology infrastructu ...
*
Timeline of computer viruses and worms This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. 1960s * John von Neumann's article on the "Theory of ...
*
Dridex Dridex, also known as Bugat and Cridex, is a type of malware that specializes in stealing bank credentials through a system that utilizes macros from Microsoft Word. It primarily targets Windows users who open malicious email attachments in Wor ...
, separate malware conspiracy involving Yakubets *
Torpig Torpig, also known as Anserin or Sinowal is a type of botnet spread through systems compromised by the Mebroot rootkit by a variety of trojan horses for the purpose of collecting sensitive personal and corporate data such as bank account and credit ...
, another botnet spread through Trojan horses *
Black hat (computer security) A black hat (black hat hacker or blackhat) is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. These acts can range from piracy to identity theft. A black hat is often r ...
, term analogous to "cybercriminals"


Notes and references


Notes


References


General sources

* * * *


External links


Wanted poster of Klepikov, Penchukov, and Bron

"JabberZeuS Crew"
on
AT&T Cybersecurity LevelBlue (formerly AT&T Cybersecurity) is a managed security service provider. Cybersecurity investor WillJam Ventures officially launched LevelBlue, a joint venture with AT&T, to form a new, standalone managed cybersecurity services business ...
(aka AlienVault)
Indictment of Yakubets for his actions for the Jabber Zeus crew, as well as other cybercriminal conspiracies
{{DEFAULTSORT:Jabber Zeus Windows trojans People convicted of money laundering Botnets Hacking in the 2000s Hacking in the 2010s 2009 in computing 2010 in computing