Zeus Trojan/bot, also known as Zbot - I received this email via my ISP Provider

pcslookout

Lifer
Mar 18, 2007
11,959
156
106
Dear Subscriber,

(My ISP) has identified that one or more of the computers behind your cable modem are likely infected with the Zeus Trojan/bot, also known as Zbot.

While this malicious software is not new, it still poses a great risk to your computer and files that reside on your hard drive.



Zeus malware uses keylogging in order to access user names and passwords and infected over 13 million computers worldwide.

This is not the whole email the other part goes into how to scan my pc for it.

My question is why can't I find it on any of my computers ? The Zeus Trojan/bot, also known as Zbot I mean. If I am infected.

Should I trust this email ?

I asked my ISP if it was a email from them and they said yes.

Can this Zeus Trojan/bot, also known as Zbot infect a iPhone or iPad ?

Any help greatly appreciated. Thanks.
 

pcslookout

Lifer
Mar 18, 2007
11,959
156
106
Ok I ran Herdprotect portable on my only machine and found nothing.

Then I ran it on another family members machine and just found couponhelper which isn't dangerous but it is a PUP.
 

Elixer

Lifer
May 7, 2002
10,371
762
126
Run Kaspersky's TDSSKiller with 'Detect TDLFS file system' option enabled. (It is disabled by default).
Should find it, unless they did an update on Zeus.
 

Elixer

Lifer
May 7, 2002
10,371
762
126
Well, your options seem to be, wait for the malware guys to come up with new detection routines, or, blow away the current OS partition, and reinstall the OS.
Because of the keylogging nature of Zeus, I would tend to not wait, and reinstall the OS.

The other possibility is, the ISP is wrong, and they had a false positive with your traffic.
Don't suppose it is possible to ask them for more information on why they think you have been infected with Zeus?
 

pcslookout

Lifer
Mar 18, 2007
11,959
156
106
Well, your options seem to be, wait for the malware guys to come up with new detection routines, or, blow away the current OS partition, and reinstall the OS.
Because of the keylogging nature of Zeus, I would tend to not wait, and reinstall the OS.

The other possibility is, the ISP is wrong, and they had a false positive with your traffic.
Don't suppose it is possible to ask them for more information on why they think you have been infected with Zeus?

I did that yesterday to my computer at least.

They couldn't tell me what computer it was.
 

Spacehead

Lifer
Jun 2, 2002
13,067
9,858
136
Is Cox your ISP? Have you run a DNS benchmark from GRC lately?

Podcast #594, i'm guessing starts about 1:10 into it.

Quote from the transcripts
https://www.grc.com/sn/sn-594.htm
One is that I've been meaning to mention this for a couple weeks because this is a few weeks old now. Many people have noted this; and I finally, when I was putting this together, I said, okay, I'm not going to forget again. This was via a Twitter DM. A listener said: "Hi, Steve. Just got an email from Cox." He said, "Seems to be from them, based on the header." So he was skeptical. Good. He says: "As I write this, it might be your DNS Benchmark triggered this." And in fact I'm sure of it. Cox has an email they're sending out to people who have used GRC's DNS Benchmark. It reads: "Cox has identified that one or more of the computers behind your cable modem are likely infected with the Zeus Trojan bot, also known as Zbot." And it goes on, but that's the headline.

So he says: "My first question is how can Cox see what's behind our modem? We're running NAT routers. Second, the only thing that changed over the past day is that I replaced our previous routers with Linksys running dd-wrt," and he says, "a.k.a. Tomato. Could dnsmasq be causing this false positive?" And he says, "Oh. I also ran your DNS Nameserver Benchmark the other night and rebuilt our list of nameservers. Perhaps that unusual traffic was it. Third, when did Cox start caring if a key logger is installed on one of our computers? Again, how could Cox know? Is Cox seeing a bunch of data coming out of our router all of a sudden?" And then he ends saying, parens, "(DNS Benchmark would do that.)" And he's absolutely right.

A number of people have reported that they've received such an email from Cox. Clearly there is a one-to-one correspondence between using the DNS Benchmark and receiving this note. So what has apparently happened is about a month ago, just judging, or maybe at the beginning of the year - no, it's longer than that, I think I got some at the end of 2016 - Cox decided to get proactive, which is a good thing, in looking at their subscribers' traffic. And again, I just think that's all for the better, that we wish more ISPs would be more proactive.

Unfortunately, running the Benchmark does look like, if you didn't look too carefully, like you are generating a DNS reflection attack because a DNS reflection attack sends a bunch of little queries off to a whole bunch of different DNS servers, and with a spoofed source IP. Now, of course the source IP is not spoofed. So they could be a little smarter about this and see that in fact what's actually happening is a bunch of valid DNS queries spewing out from a given client. So the only one they would ever be DoSing would be themselves. And of course the Benchmark is very careful about metering those so that you don't saturate your own bandwidth because one of the things that the Benchmark does is check the reliability of the DNS servers. So I wouldn't want to saturate the connection, or we'd cause packets to be dropped and get false positives on low reliability, that I was careful not to do.

So anyway, for anybody else who has received this letter from Cox and has shot me a note, but I never responded, I'm absolutely sure that there is a correlation. And it doesn't seem that anything goes further. Nobody's had their traffic cut off. Cox is just providing them with a warning. And that does demonstrate that, on a per-subscriber basis, Cox has deployed technology to notice if the behavior of their subscribers indicates that they may be infected. So although it's a false positive that occurs when you run the DNS Benchmark, it does say that we're seeing some positive movement in this direction from a major Internet connectivity provider.