Understanding and mitigating banking Trojans: from Zeus to Emotet

Konstantinos Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Costas Vassilakis, Stavros Shiaeles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Downloads (Pure)

Abstract

Banking Trojans came a long way in the past decade, and the recent case of Emotet showed their enduring relevance. The evolution of the modern computing landscape can be traced through Emotet and Zeus, both representative examples from the end of the past decade. As an example of earlier malware, Zeus only needed to employ simple anti-analysis techniques to stay undetected; while the more recent Emotet had to constantly evolve to stay a step ahead. Current host-based antimalware solutions face an increasing number of obstacles to perform their function. A multi-layer approach to network security is necessary for network-based intrusion response systems to secure modern networks of heterogeneous devices. A system based on a combination of a graphical network security model and a game theoretic model of cyber attacks was tested on a testbed with Windows machines infected with Trojans; experimental results showed that the proposed system effectively blocked Trojans’ network communications effectively preventing data leakage and yielding encouraging results for future work.
Original languageEnglish
Title of host publication2021 IEEE International Conference on Cyber Security and Resilience (CSR)
PublisherIEEE
Pages121-128
ISBN (Electronic)9781665402859
ISBN (Print)9781665402866
DOIs
Publication statusPublished - 6 Sep 2021
Event2021 IEEE International Conference on Cyber Security and Resilience - Virtual
Duration: 26 Jul 202128 Jul 2021
https://www.ieee-csr.org/

Conference

Conference2021 IEEE International Conference on Cyber Security and Resilience
Abbreviated titleIEEE CSR
Period26/07/2128/07/21
Internet address

Keywords

  • Cyber security
  • Reverse engineering
  • Malware analysis
  • Intrusion response systems
  • Graphical security models

Fingerprint

Dive into the research topics of 'Understanding and mitigating banking Trojans: from Zeus to Emotet'. Together they form a unique fingerprint.

Cite this