We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Zeus botnet found on Amazon cloud network

Hacked website put criminals on EC2 servers

Security researchers have spotted the Zeus botnet running an unauthorised command and control centre on Amazon's EC2 cloud computing infrastructure.

This marks the first time Amazon Web Services' cloud infrastructure has been used for this type of illegal activity, according to Don DeBolt, director of threat research with HCL Technologies, a contractor that does security research for CA. The hackers didn't do this with Amazon's permission, however. They got onto Amazon's infrastructure by first hacking into a website that was hosted on Amazon's servers and then secretly installing their command and control infrastructure.

DeBolt declined to say whose website was hacked to get onto Amazon's cloud, but the Zeus software has now been removed, he said. Zeus is a password-stealing botnet. Variants of this malware have been linked to more than $100 million in bank fraud in the past year.

He thinks the hackers may have just stumbled on a website with a security vulnerability - they may have hacked the site's software or simply stolen an administrative password from a desktop computer to get on the site. "I think it's more a target of opportunity than a target of choice," he said.

In the past few years, law enforcement takedowns and bad publicity have made it harder for many criminals to host their back-end infrastructure in legitimate or even semi-legitimate data centres, so they have moved to web-based services. Although this didn't happen in this case, law enforcement officials worry that criminals might start using stolen credit cards to purchase cloud-based computing services from companies such as Amazon.

In August, security vendor Arbor Networks spotted a botnet that used Twitter to issue commands to hacked computers. Security experts say that criminals will probably seek out new Web services to use in 2010.

See also:

PC security advice


IDG UK Sites

The best iPhone 6 alternatives: Price and specs compared with the best smartphones

IDG UK Sites

The top 10 Apple products ranked by pixel density: Which Apple devices have the sharpest screens?

IDG UK Sites

SBTRKT's Look Away webcam-based interactive music video won't keep your gaze

IDG UK Sites

Retina MacBook Air release date rumours and specs: Gold 12in Retina MacBook Air almost 1cm thinner...