Rootkit.Win32.Zbot.sapu
Posted: April 24, 2014
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 5,098 |
---|---|
Threat Level: | 1/10 |
Infected PCs: | 5,045 |
First Seen: | April 25, 2014 |
---|---|
Last Seen: | October 14, 2023 |
OS(es) Affected: | Windows |
Rootkit.Win32.Zbot.sapu is a variant of the banking Trojan Zeus (AKA Zbot or ZeuS), threat designed for gathering information, but especially bank account logins. Continuing with the trend of backdoor-capable Trojans using e-mail spam for their distribution, the installation of Rootkit.Win32.Zbot.sapu exploits file attachments linked to fake messages for Starbucks coffee gifts. Considering the severe consequences of installing Rootkit.Win32.Zbot.sapu, malware researchers recommend turning down this scalding 'gift,' or using anti-malware products to delete Rootkit.Win32.Zbot.sapu, if it is too late for that.
A Sip of a Drink that may Burn Your PC
Rootkit.Win32.Zbot.sapu is one of the many, different versions of Trojan Zeus in circulation throughout the Web. The effectiveness of Zeus is evident in its popularity among hackers, who have used different methods to distribute it, install it, maintain its presence and, ultimately, compromise victims' bank accounts. Although Rootkit.Win32.Zbot.sapu and other Zeus Trojans are particularly well-known for their 'Man-in-the-middle' bank account attacks, they also may compromise other information.
Malware experts found Rootkit.Win32.Zbot.sapu's story beginning with a series of fraudulent e-mail messages formatted to appear as gift notifications from Starbucks. Although these messages include the company's logo, poor use of English, an inappropriate e-mail address and an EXE file attachment all are signs of its real, aggressive intentions. Victims who don't spot these warning signs and open the file may infect their PC with Rootkit.Win32.Zbot.sapu.
Rootkit.Win32.Zbot.sapu is one of the few versions of Zeus that use rootkit technology. Rootkit.Win32.Zbot.sapu installs an additional PC threat, a variant of the Necurs rootkit, which requires particularly strenuous security solutions to delete, and which may install other threats, block security applications or give third parties control of your PC in the meantime. The version of Nercurs may be different, depending on whether the infected PC uses 64-bit or 32-bit Windows.
Having Good Taste in Your E-mail Files
Although most threat distributors go to the trouble of using encryption, archives or complex Trojan dropper-based installations to hide their payloads, Rootkit.Win32.Zbot.sapu's e-mail attachment is an obvious, and obviously threatening 'executable' or EXE file. These file types never should be installed under the assumption that they are safe, and malware researchers also find recurring cases of threatening EXE files using inappropriate file type extensions to disguise themselves. However, since no reputable company distributes gifts through unannounced e-mail-distributed files, you scarcely can go wrong by deleting similar e-mail messages as soon as you see them.
Rootkit.Win32.Zbot.sapu's creators may not have cared enough to hide Rootkit.Win32.Zbot.sapu very well, but an installed Rootkit.Win32.Zbot.sapu does continue to have the capacity for causing harm to your PC. Stolen financial information and hacked accounts are some of the usual consequences of a Zeus Trojan, and malware experts would recommend changing bank passwords, in particular, after you've removed Rootkit.Win32.Zbot.sapu with any security product.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.