Understanding and mitigating banking Trojans: from Zeus to Emotet

Konstantinos Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Costas Vassilakis, Stavros Shiaeles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

187 Downloads (Pure)


Banking Trojans came a long way in the past decade, and the recent case of Emotet showed their enduring relevance. The evolution of the modern computing landscape can be traced through Emotet and Zeus, both representative examples from the end of the past decade. As an example of earlier malware, Zeus only needed to employ simple anti-analysis techniques to stay undetected; while the more recent Emotet had to constantly evolve to stay a step ahead. Current host-based antimalware solutions face an increasing number of obstacles to perform their function. A multi-layer approach to network security is necessary for network-based intrusion response systems to secure modern networks of heterogeneous devices. A system based on a combination of a graphical network security model and a game theoretic model of cyber attacks was tested on a testbed with Windows machines infected with Trojans; experimental results showed that the proposed system effectively blocked Trojans’ network communications effectively preventing data leakage and yielding encouraging results for future work.
Original languageEnglish
Title of host publication2021 IEEE International Conference on Cyber Security and Resilience (CSR)
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665402859
ISBN (Print)9781665402866
Publication statusPublished - 6 Sept 2021
Event2021 IEEE International Conference on Cyber Security and Resilience - Virtual
Duration: 26 Jul 202128 Jul 2021


Conference2021 IEEE International Conference on Cyber Security and Resilience
Abbreviated titleIEEE CSR
Internet address


  • Cyber security
  • Reverse engineering
  • Malware analysis
  • Intrusion response systems
  • Graphical security models


Dive into the research topics of 'Understanding and mitigating banking Trojans: from Zeus to Emotet'. Together they form a unique fingerprint.

Cite this