Home Malware Programs Trojans ZeusVM

ZeusVM

Posted: March 6, 2014

Threat Metric

Threat Level: 9/10
Infected PCs: 145
First Seen: March 10, 2014
Last Seen: November 21, 2024
OS(es) Affected: Windows

ZeusVM is a Trojan that spreads to vulnerable computer systems as a configuration file which is hidden as a harmless image. ZeusVM is a new version of the ZeuS banking Trojan that targets financial institutions. ZeusVM is created to retrieve its configuration file from an image. ZeusVM retrieves a JPG image from a server alongside other components. An image is copied from the Internet, but with some additional code attached to it. By using steganography, the attackers have added the malware configuration data to the image without destroying it. The fact that the configuration file is hidden as an image has numerous advantages, involving the fact that the malicious code can avoid security software. A PC user, whose computer is used to host the file would likely not suspect that the image is, in actuality, a part of a malicious operation.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to ZeusVM may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.